Static task
static1
Behavioral task
behavioral1
Sample
43eef80f9a0a7ac5114cfbd9592aa3de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43eef80f9a0a7ac5114cfbd9592aa3de.exe
Resource
win10v2004-20231222-en
General
-
Target
43eef80f9a0a7ac5114cfbd9592aa3de
-
Size
551KB
-
MD5
43eef80f9a0a7ac5114cfbd9592aa3de
-
SHA1
7bdb36c407aac155cee303613ca61bd91d32a482
-
SHA256
109916cc9454f05294f76aaa6802fd08b2df61a5a771260650577e724e3d50b1
-
SHA512
f5695a56c337e22efaf4f237fb56a0f6a6c8a85bb309e690718ce4a95dd68a9f47009881dd60c25cb93aef313201435e73a4ad0092e086dece6293a98a1206d5
-
SSDEEP
12288:vuFdRJ+JdgUwM90tZ6B2Kj4mUEzlsDYlyFsul7RnWpRYkAhhU/K:8i/46UEzXyXFu21hg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43eef80f9a0a7ac5114cfbd9592aa3de
Files
-
43eef80f9a0a7ac5114cfbd9592aa3de.exe windows:4 windows x86 arch:x86
744551b5081d674c862becbba0303b34
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
UnhookWindowsHookEx
RegisterClassExW
FindWindowW
DdeKeepStringHandle
GetClassInfoA
SetWindowsHookExA
GetForegroundWindow
SetParent
SetClassLongA
GetMonitorInfoA
EnableScrollBar
OpenIcon
CopyAcceleratorTableA
RegisterClassA
CountClipboardFormats
GetNextDlgGroupItem
SetWindowsHookW
DrawStateA
RegisterClassExA
GetClipboardFormatNameW
UnregisterClassW
GetClipboardOwner
OffsetRect
comctl32
InitCommonControlsEx
kernel32
GetStringTypeA
GetCurrentThreadId
LoadLibraryA
ExitProcess
GetOEMCP
LCMapStringA
GetLocaleInfoA
SetComputerNameA
HeapValidate
GetEnvironmentStrings
GetSystemTimeAsFileTime
TlsGetValue
InitializeCriticalSectionAndSpinCount
CompareStringA
GetDateFormatA
VirtualAlloc
HeapCreate
OutputDebugStringW
GetProcessHeap
TlsAlloc
CreateRemoteThread
SetUnhandledExceptionFilter
ReadFile
HeapSize
FlushFileBuffers
HeapFree
lstrlenA
GetLastError
GetTimeFormatA
MultiByteToWideChar
TerminateProcess
GetModuleFileNameA
SetFilePointer
CloseHandle
CreateWaitableTimerA
FreeLibrary
GetConsoleOutputCP
GetProcAddress
OutputDebugStringA
EnumSystemLocalesA
TlsSetValue
GetStringTypeW
GetEnvironmentStringsW
GetTempPathW
GetConsoleMode
OpenMutexW
GetStartupInfoA
QueryPerformanceCounter
GetLocaleInfoW
GetProfileStringW
CompareStringW
HeapAlloc
InterlockedIncrement
VirtualFree
SetLastError
HeapDestroy
GetConsoleCP
lstrlen
CreateFileA
GetTickCount
SetHandleCount
GetNumberFormatW
RaiseException
GetCurrentProcess
IsValidCodePage
GetUserDefaultLCID
GetTimeZoneInformation
FreeEnvironmentStringsW
InterlockedDecrement
DebugBreak
GetModuleFileNameW
RtlUnwind
IsValidLocale
GetACP
EnumResourceLanguagesW
lstrcpy
LCMapStringW
UnhandledExceptionFilter
WriteConsoleW
WideCharToMultiByte
GetModuleHandleA
GetFileType
SetStdHandle
OpenMutexA
InterlockedExchangeAdd
WriteFile
TlsFree
FreeEnvironmentStringsA
SetConsoleCtrlHandler
DeleteCriticalSection
GetCPInfo
IsDebuggerPresent
ReadConsoleOutputW
GetStdHandle
GetModuleHandleW
CreateMutexA
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetPrivateProfileSectionA
Sleep
GetCommandLineA
VirtualQuery
InterlockedExchange
ReadConsoleOutputCharacterA
SetEnvironmentVariableA
IsBadReadPtr
GetSystemDirectoryW
CreateMailslotW
GetCurrentThread
WriteConsoleA
SetConsoleCP
HeapReAlloc
GetCurrentProcessId
shell32
SHAppBarMessage
SHInvokePrinterCommandW
DragFinish
SHUpdateRecycleBinIcon
InternalExtractIconListW
Sections
.text Size: 316KB - Virtual size: 316KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ