Static task
static1
Behavioral task
behavioral1
Sample
457fe387149a45795cf946e1e99624f2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
457fe387149a45795cf946e1e99624f2.exe
Resource
win10v2004-20231215-en
General
-
Target
457fe387149a45795cf946e1e99624f2
-
Size
140KB
-
MD5
457fe387149a45795cf946e1e99624f2
-
SHA1
a941bfa0b314d31153d640e7cadb8ee38c75b1ed
-
SHA256
12e8ab4e03e30c66a94c76918a6da09ddcb1710704c9e6c2273c1016f76b782a
-
SHA512
7b76da3d85594aaa9b9a0c803c2abf8675ae5fa2ce5ed11a8c625e6061ff00e68d72440c57acd8dba3873e5087164d44355d57b487f3ff90a82d76edea47e513
-
SSDEEP
3072:zqSuO8ZrIzIOQnpX6MmB0VoBFoz171npil+fzx:oZCIZh6Mmhu17fz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 457fe387149a45795cf946e1e99624f2
Files
-
457fe387149a45795cf946e1e99624f2.exe windows:4 windows x86 arch:x86
64e9628954b47479ad0b6ee3fe6a65fd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
kernel32
GlobalAddAtomA
GlobalGetAtomNameA
FreeLibrary
LoadLibraryA
GetProcessVersion
SetErrorMode
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
GetFullPathNameA
GetCPInfo
GetOEMCP
RtlUnwind
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetDriveTypeA
ExitProcess
GetStartupInfoA
GetCommandLineA
GetACP
GlobalFindAtomA
RaiseException
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetCurrentDirectoryA
lstrcpyA
lstrcatA
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcpynA
GetLastError
SetLastError
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LocalFree
FileTimeToLocalFileTime
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetProcAddress
GetVersionExA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetTempPathA
SystemTimeToFileTime
GetUserDefaultLangID
CreateToolhelp32Snapshot
Process32First
OpenProcess
GetExitCodeProcess
TerminateProcess
Process32Next
WaitForSingleObject
FileTimeToSystemTime
CloseHandle
GetWindowsDirectoryA
FindFirstFileA
FindClose
GetFileAttributesA
CopyFileA
GetSystemDirectoryA
CreateDirectoryA
SetFileAttributesA
GetLocalTime
lstrlenA
GetVersion
DeleteFileA
MoveFileA
GetCurrentProcessId
user32
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
DestroyMenu
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetWindowTextA
SetWindowTextA
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
UnregisterClassA
GetCapture
LoadStringA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
PostMessageA
GetSystemMetrics
wsprintfA
LoadCursorA
ClientToScreen
gdi32
ScaleWindowExtEx
GetClipBox
SetWindowExtEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
GetStockObject
SelectObject
RestoreDC
SaveDC
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
CreateBitmap
DeleteDC
DeleteObject
SetBkColor
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ShellExecuteExA
comctl32
ord17
ole32
CoCreateInstance
CoInitialize
urlmon
URLDownloadToFileA
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ