Static task
static1
Behavioral task
behavioral1
Sample
42ed31345323ff3d58024147dd353c38.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42ed31345323ff3d58024147dd353c38.exe
Resource
win10v2004-20231215-en
General
-
Target
42ed31345323ff3d58024147dd353c38
-
Size
122KB
-
MD5
42ed31345323ff3d58024147dd353c38
-
SHA1
b0e17650817e239d64740d88675ae7145c1a970a
-
SHA256
c258a77526bd7a86c51fa299de2e14ad04e26001e4bea5ca05df71697ae79a51
-
SHA512
5173d27410e524768c8e1f059789ab3a9a3bc943afe92275f686aadb66f59f4d11c500f72dce20bbd930440b38cae6aa72e38a952c6fe966329bc0538eb26747
-
SSDEEP
1536:MCvcGuOt+/SmgkOxdSH4aqNAgOiutlftwn3k6nmezWZJC2eKC4IAMNSrS8:MCvcY+/rgjSppDJw3k6n/CC9AYSm8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42ed31345323ff3d58024147dd353c38
Files
-
42ed31345323ff3d58024147dd353c38.exe windows:4 windows x86 arch:x86
70a093ceec1390e9befffc9e8288f60b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysFreeString
user32
ScreenToClient
GetMenuState
EnableScrollBar
TranslateMessage
DestroyCursor
DrawIconEx
CreatePopupMenu
ShowScrollBar
EnumChildWindows
IsIconic
GetActiveWindow
GetMenu
MapVirtualKeyA
GetIconInfo
RegisterWindowMessageA
GetKeyboardLayout
MessageBoxA
GetPropA
RemovePropA
EmptyClipboard
IsWindowUnicode
OpenClipboard
FindWindowA
DrawTextA
PeekMessageW
wsprintfA
TranslateMDISysAccel
CharNextA
CharNextW
GetSystemMetrics
DefMDIChildProcA
IsWindowVisible
WaitMessage
RedrawWindow
GetWindow
SetMenu
DrawAnimatedRects
SetFocus
MoveWindow
CreateWindowExA
GetCursor
GetScrollRange
GetKeyboardLayoutList
GetScrollPos
PtInRect
InsertMenuA
EnableWindow
GetSysColor
SetParent
ReleaseCapture
GetKeyboardState
RegisterClassA
CharLowerBuffA
GetClassNameA
LoadBitmapA
GetCursorPos
MessageBeep
ShowOwnedPopups
SetTimer
DestroyWindow
CharUpperBuffA
InflateRect
GetWindowLongW
DrawMenuBar
SetScrollInfo
ActivateKeyboardLayout
IsRectEmpty
SendMessageA
WindowFromPoint
GetWindowTextA
GetParent
ChildWindowFromPoint
SetScrollPos
SetWindowPos
SetWindowTextA
SetActiveWindow
GetKeyNameTextA
SetWindowLongW
DeleteMenu
PostMessageA
SetCapture
TrackPopupMenu
FillRect
SendMessageW
SetWindowLongA
IsZoomed
GetClassInfoA
CloseClipboard
GetDesktopWindow
DispatchMessageW
IsWindowEnabled
IsDialogMessageW
GetLastActivePopup
LoadStringA
GetMenuItemCount
IsChild
GetKeyState
GetMenuStringA
SystemParametersInfoA
CharToOemA
GetTopWindow
GetMenuItemInfoA
GetWindowRect
GetSystemMenu
CreateIcon
ScrollWindow
SetClassLongA
SetWindowPlacement
GetScrollInfo
GetFocus
UnhookWindowsHookEx
UnregisterClassA
KillTimer
EqualRect
LoadIconA
CreateMenu
GetForegroundWindow
PeekMessageA
GetSubMenu
DestroyMenu
CheckMenuItem
GetDlgItem
GetWindowDC
SetScrollRange
DestroyIcon
SetCursor
PostQuitMessage
ReleaseDC
DrawEdge
LoadKeyboardLayoutA
GetMenuItemID
LoadCursorA
CharLowerA
EnumWindows
GetWindowThreadProcessId
GetClipboardData
CallWindowProcA
GetDC
RegisterClipboardFormatA
MapWindowPoints
DrawFrameControl
ClientToScreen
GetMessagePos
CallNextHookEx
IsDialogMessageA
InvalidateRect
IsWindow
EnumThreadWindows
OemToCharA
EnableMenuItem
SetForegroundWindow
GetSysColorBrush
MsgWaitForMultipleObjects
DefFrameProcA
DrawIcon
DispatchMessageA
GetKeyboardType
ShowWindow
OffsetRect
IntersectRect
FrameRect
GetKeyboardLayoutNameA
RemoveMenu
SetPropA
GetWindowLongA
GetClientRect
BeginPaint
GetWindowPlacement
SetWindowsHookExA
AdjustWindowRectEx
UpdateWindow
GetClassLongA
GetDCEx
GetCapture
SetMenuItemInfoA
DefWindowProcA
EndPaint
SetClipboardData
comdlg32
FindTextA
ChooseColorA
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
version
GetFileVersionInfoA
VerFindFileA
advapi32
RegQueryInfoKeyA
RegEnumKeyA
RegOpenKeyA
shell32
SHGetDiskFreeSpaceA
gdi32
GetDIBits
GetCurrentPositionEx
GetClipBox
SelectPalette
GetObjectA
kernel32
FindFirstFileA
LocalAlloc
GetLastError
GlobalFindAtomA
MulDiv
ExitProcess
VirtualAllocEx
GetModuleHandleA
GetProcAddress
GetOEMCP
GlobalAddAtomA
CreateFileA
LoadLibraryA
VirtualAlloc
HeapDestroy
VirtualQuery
Sections
CODE Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 877B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ