Static task
static1
Behavioral task
behavioral1
Sample
294da5170828fe4803bf78c2f1fbe462.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
294da5170828fe4803bf78c2f1fbe462.exe
Resource
win10v2004-20231215-en
General
-
Target
294da5170828fe4803bf78c2f1fbe462
-
Size
137KB
-
MD5
294da5170828fe4803bf78c2f1fbe462
-
SHA1
13759f66197907e47d41d3acaec5cd4940940c68
-
SHA256
1359dfb6092020aab29f5566de879633a518910692ff7ea6c9377e6271ffd0e2
-
SHA512
fb776cc8acf24529ff30f2d1f4e1a657b7b470d702a840f7b597e38493186436c1389d444ce1a2ee638ed4edc3415957401ca55d739feaaecb5aed33d91cdd27
-
SSDEEP
3072:9rBWNkbMLpPeDURaXeM/u5FMHtijsAQw1axtrHN5uPDaHymQtP:tqZsDURaWZTbwhHfUaHA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 294da5170828fe4803bf78c2f1fbe462
Files
-
294da5170828fe4803bf78c2f1fbe462.exe windows:5 windows x86 arch:x86
1187e6ff41466e89f4fde8006301cec7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
OffsetRgn
CreatePen
GetRandomRgn
SetAbortProc
GetSystemPaletteEntries
GetCharABCWidthsA
EnumFontsA
GetClipRgn
SetPixel
GetBitmapBits
GetBkColor
SetTextColor
GetPixel
GetEnhMetaFileDescriptionA
GetMapMode
GetTextExtentPoint32A
GetObjectA
SetViewportExtEx
SetROP2
SetRectRgn
comctl32
ImageList_DragMove
ImageList_LoadImageA
ImageList_DragEnter
wininet
InternetCloseHandle
InternetOpenA
FtpOpenFileA
InternetGetLastResponseInfoA
user32
EndDeferWindowPos
SendDlgItemMessageA
EnableWindow
SendMessageA
GetActiveWindow
SetForegroundWindow
DefWindowProcW
DrawIconEx
GetKeyNameTextW
DestroyIcon
PeekMessageA
GetWindowLongA
CallNextHookEx
CharLowerA
ScrollWindowEx
PtInRect
GetCaretPos
RegisterWindowMessageA
GetMessageA
CharUpperA
DispatchMessageA
EnumChildWindows
ShowOwnedPopups
SetWindowsHookExW
LoadCursorA
SetMenuItemInfoW
DefFrameProcA
IsWindowUnicode
FillRect
RegisterClassA
GetFocus
HideCaret
CreateCaret
MoveWindow
SendMessageW
SetScrollPos
DrawEdge
GetKeyboardLayoutList
EnableMenuItem
DestroyCaret
SetActiveWindow
TranslateMDISysAccel
GetSysColorBrush
GetSystemMenu
IsRectEmpty
kernel32
ExitProcess
SetLastError
VirtualQuery
UnhandledExceptionFilter
WaitForMultipleObjects
FileTimeToLocalFileTime
CreateFileMappingA
TerminateProcess
RtlUnwind
GetWindowsDirectoryA
GlobalAlloc
GetTimeZoneInformation
lstrcmpA
VirtualQueryEx
MapViewOfFileEx
CreateFileMappingA
GetFileSize
GetSystemInfo
GetCurrentProcessId
GetModuleFileNameA
SetThreadAffinityMask
CreateProcessA
LoadResource
lstrlenW
RemoveDirectoryA
GetModuleHandleA
CloseHandle
UnmapViewOfFile
winmm
PlaySoundA
dxpcamd
_Xbig
_Denorm
_LEps
_LCosh
_LDenorm
_Hugeval
_Cosh
ole32
OleSetMenuDescriptor
CreateDataAdviseHolder
ProgIDFromCLSID
CoTaskMemFree
oleaut32
SysAllocStringByteLen
SysReAllocStringLen
GetActiveObject
VariantCopyInd
SafeArrayGetUBound
advapi32
RegSetValueExA
RegDeleteKeyA
urlmon
CoInternetCreateSecurityManager
shell32
ShellExecuteA
SHGetMalloc
version
VerQueryValueA
Sections
.text Size: 110KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ