Static task
static1
Behavioral task
behavioral1
Sample
458c6218844e0320c127671850364416.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
458c6218844e0320c127671850364416.exe
Resource
win10v2004-20231222-en
General
-
Target
458c6218844e0320c127671850364416
-
Size
220KB
-
MD5
458c6218844e0320c127671850364416
-
SHA1
fc322f58fd69e22557b0a236cbe1ccd60e23d58c
-
SHA256
e2f312b753a46f3ede7f4784e8aecbac3c20b19df248c2835c8f14168add7bfb
-
SHA512
5e8f36f430bb91b54887fea3feea7e59776962b0277f2179def48be0de867880085cfb59506bbc1d51d7c93af6f416f12c40242398c3d54884b8dcf19f4b70f3
-
SSDEEP
6144:CSkfcZOTVLnBwZDgF7QXrJpaxVsaTDHM3:TkugwZDgRaNpaxya30
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 458c6218844e0320c127671850364416
Files
-
458c6218844e0320c127671850364416.exe windows:4 windows x86 arch:x86
edb4e6930716e4ae4e8c6e8eb2e93cda
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
ShellExecuteA
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetReadFile
shlwapi
SHGetValueA
PathFindExtensionA
PathFileExistsA
PathFindFileNameA
StrStrA
PathAppendA
PathRemoveFileSpecA
SHDeleteValueA
SHSetValueA
iphlpapi
GetAdaptersInfo
kernel32
LocalReAlloc
DeleteCriticalSection
TlsFree
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
lstrcmpA
GetCurrentThreadId
GlobalFlags
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
TlsSetValue
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
ExitProcess
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GetCurrentProcess
GetThreadLocale
FlushFileBuffers
SetFilePointer
GlobalGetAtomNameA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
GetModuleFileNameA
GetTempPathA
GetCurrentThread
OpenMutexA
CopyFileA
WriteFile
CreateProcessA
Sleep
CreateMutexA
GetComputerNameA
CreateFileA
GetFileSize
ReadFile
DeleteFileA
GetVersionExA
SetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
WaitForSingleObject
TerminateProcess
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
user32
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowPos
SetWindowLongA
IsWindow
GetFocus
ClientToScreen
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnregisterClassA
SetWindowsHookExA
PostMessageA
FindWindowExA
GetWindowThreadProcessId
EnumWindows
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
SendMessageTimeoutA
FindWindowA
GetWindowTextA
GetWindow
GetDesktopWindow
RegisterWindowMessageA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSystemMetrics
MessageBoxA
UnhookWindowsHookEx
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetDlgItem
gdi32
GetClipBox
DeleteDC
CreateBitmap
GetStockObject
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegOpenKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ