Static task
static1
Behavioral task
behavioral1
Sample
984ec4e32755161bfa8bdccfcaf2e556238b964a788ef69e2594cb3279a73842.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
984ec4e32755161bfa8bdccfcaf2e556238b964a788ef69e2594cb3279a73842.exe
Resource
win10v2004-20231215-en
General
-
Target
984ec4e32755161bfa8bdccfcaf2e556238b964a788ef69e2594cb3279a73842
-
Size
475KB
-
MD5
6b6538ce0ca23091471c8371c0adf845
-
SHA1
6221703ae32232874bc8ef06970118b555a0aebc
-
SHA256
984ec4e32755161bfa8bdccfcaf2e556238b964a788ef69e2594cb3279a73842
-
SHA512
3b2bbc7ca9e7a6b52196a466390a16cc6892cc4b77661cec818838ed095f326e37cce83286268b9230c3ddd70db5385f9e1c927af72882f3c7805cdf0a415aa2
-
SSDEEP
12288:EN2oFbk47+9pkg3IQoPCgqt5RqnNhyrKIiTtSc:c2oFbk0wnkqt5RqnNhyrKIAAc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 984ec4e32755161bfa8bdccfcaf2e556238b964a788ef69e2594cb3279a73842
Files
-
984ec4e32755161bfa8bdccfcaf2e556238b964a788ef69e2594cb3279a73842.exe windows:5 windows x86 arch:x86
81cb74301a6358cc18fbfce406b4eee8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
FreeResource
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
lstrlenA
GetLastError
WideCharToMultiByte
lstrlenW
GetPrivateProfileIntW
SetFileAttributesW
GetPrivateProfileStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
GetLocalTime
InterlockedIncrement
InterlockedDecrement
MulDiv
DuplicateHandle
GetFileType
GetCurrentProcess
SystemTimeToFileTime
SetFilePointer
DosDateTimeToFileTime
CloseHandle
ReadFile
GetFileSize
FindFirstFileW
CreateFileW
GetTickCount
GetModuleHandleW
GetProcAddress
WaitForSingleObject
FindNextFileW
CopyFileW
GetStartupInfoA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
LoadLibraryW
GetModuleFileNameW
GetCurrentDirectoryW
user32
SetPropW
GetPropW
AdjustWindowRectEx
GetMenu
IntersectRect
CharNextW
CreateCaret
ShowCaret
HideCaret
SetCaretPos
ClientToScreen
GetSysColor
GetCaretPos
FillRect
DrawTextW
SetRect
CharPrevW
SetWindowTextW
GetWindowTextLengthW
GetWindowTextW
InvalidateRgn
CreateAcceleratorTableW
MoveWindow
SetTimer
GetFocus
DispatchMessageW
TranslateMessage
GetMessageW
GetCursorPos
CreateWindowExW
CallWindowProcW
InvalidateRect
IsRectEmpty
EndPaint
BeginPaint
GetUpdateRect
SetFocus
GetWindow
GetDC
ReleaseDC
DestroyWindow
GetKeyState
SendMessageW
MessageBoxW
SetWindowLongW
GetWindowLongW
SetWindowRgn
GetWindowRect
GetClientRect
ScreenToClient
MonitorFromWindow
GetMonitorInfoW
IsZoomed
IsIconic
LoadCursorW
InflateRect
OffsetRect
PostQuitMessage
RegisterClassExW
GetClassInfoExW
RegisterClassW
ShowWindow
SetWindowPos
EnableWindow
DefWindowProcW
GetParent
PtInRect
PostMessageW
ReleaseCapture
SetCapture
KillTimer
MapWindowPoints
IsWindow
SetCursor
advapi32
RegCloseKey
RegOpenKeyW
RegQueryValueExW
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteExW
shlwapi
PathFileExistsW
StrToIntW
msvcr90
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
_gmtime64
iswalnum
wcsncmp
wcstol
isdigit
__CxxFrameHandler3
toupper
wcscpy_s
_wtoi
_vsnwprintf
wcsrchr
_wcslwr
wcsncpy
memmove
realloc
memset
_wcsicmp
wcstoul
malloc
??2@YAPAXI@Z
vswprintf_s
_vscwprintf
calloc
_recalloc
free
wcsnlen
wcschr
wcsstr
??_V@YAXPAX@Z
swprintf_s
memmove_s
memcpy_s
_purecall
??3@YAXPAX@Z
_CxxThrowException
memcpy
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
gdi32
RoundRect
LineTo
MoveToEx
CreatePenIndirect
CreateSolidBrush
ExtTextOutW
SetBkColor
SetStretchBltMode
StretchBlt
SetBkMode
CombineRgn
ExtSelectClipRgn
CreateRectRgnIndirect
DeleteObject
GetObjectW
GetClipBox
SelectClipRgn
SetTextColor
GetCharABCWidthsW
GetObjectA
GetDeviceCaps
GetTextMetricsW
TextOutW
CreateDIBSection
CreateRoundRectRgn
GetStockObject
CreateFontIndirectW
CreatePen
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SaveDC
BitBlt
RestoreDC
Rectangle
SetWindowOrgEx
GetTextExtentPoint32W
ole32
CLSIDFromProgID
CoCreateInstance
OleLockRunning
CLSIDFromString
oleaut32
SysFreeString
VariantClear
VariantInit
SysAllocString
comctl32
ord17
_TrackMouseEvent
gdiplus
GdipDeleteGraphics
GdipSetTextRenderingHint
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipCreateFromHDC
GdipDeleteBrush
GdipFree
GdipAlloc
GdipCloneBrush
GdipDrawString
GdiplusStartup
GdipDeleteFont
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipCreateLineBrushI
GdiplusShutdown
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
Sections
.text Size: 288KB - Virtual size: 288KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ