Static task
static1
Behavioral task
behavioral1
Sample
488afa747e6e5a51950e5d90946116c3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
488afa747e6e5a51950e5d90946116c3.exe
Resource
win10v2004-20231215-en
General
-
Target
488afa747e6e5a51950e5d90946116c3
-
Size
167KB
-
MD5
488afa747e6e5a51950e5d90946116c3
-
SHA1
9afb8b31c6f0a6f9678efce255bb4410af758790
-
SHA256
a5c8ddab13df3305ed605794d3f786f34052212251af30cd3654b19589dcd7e5
-
SHA512
5d74b65c1d04a97a58bbe75778fcb9d8098871d95f7619fa8ecdf2fd2e105f909e4d1d66f937176dc40b73ff931a62510fe6b76ebf6d49ff789bdad80c9a3e88
-
SSDEEP
3072:0QxKrzC5fpVuuP7nr/I/dDnA5eomZcm7qLvTMRXr1dOFsQYWkkYgfYzDs++4ZYur:0QxKzC/VFXgpnA5TmZVq7TMRXvSYWcsO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 488afa747e6e5a51950e5d90946116c3
Files
-
488afa747e6e5a51950e5d90946116c3.exe windows:4 windows x86 arch:x86
6687c2eb29963fceb89ab30dcc9e8480
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetCapture
SetCursor
IsZoomed
MsgWaitForMultipleObjects
OpenClipboard
TranslateMessage
GetMenuItemInfoA
GetActiveWindow
GetForegroundWindow
MessageBoxA
GetMenuStringA
GetScrollRange
PeekMessageA
InsertMenuA
EnableScrollBar
GetDC
InvalidateRect
CharNextW
GetMessagePos
CharUpperBuffA
GetKeyboardLayoutList
FillRect
SetFocus
GetTopWindow
GetMenu
GetClassNameA
MessageBeep
SetScrollRange
UnregisterClassA
GetWindowDC
GetPropA
GetLastActivePopup
IsWindowEnabled
PostMessageA
DrawTextA
RedrawWindow
UpdateWindow
PeekMessageW
RegisterWindowMessageA
SetForegroundWindow
GetWindowPlacement
CreateIcon
SendMessageA
CheckMenuItem
CreatePopupMenu
GetFocus
SetWindowPlacement
DispatchMessageW
ShowWindow
WaitMessage
GetParent
RegisterClassA
MapVirtualKeyA
GetCapture
WindowFromPoint
IsRectEmpty
CloseClipboard
SetWindowLongA
SetTimer
OemToCharA
FindWindowA
PostQuitMessage
SetScrollPos
IsChild
ScrollWindow
GetMenuItemCount
SetClassLongA
SetRect
DefFrameProcA
GetDCEx
DispatchMessageA
EnableMenuItem
LoadBitmapA
TranslateMDISysAccel
MapWindowPoints
SetWindowTextA
EndPaint
GetWindow
LoadKeyboardLayoutA
GetScrollInfo
GetKeyboardState
GetSystemMetrics
GetDlgItem
SetPropA
SetClipboardData
EqualRect
RegisterClipboardFormatA
DrawIconEx
DefWindowProcA
ShowScrollBar
EnableWindow
LoadIconA
DrawIcon
DefMDIChildProcA
ActivateKeyboardLayout
InflateRect
GetClassInfoA
GetWindowLongW
GetClientRect
ReleaseDC
CharNextA
FrameRect
CallNextHookEx
CharLowerA
GetWindowTextA
GetWindowRect
GetSysColorBrush
DestroyMenu
IsDialogMessageA
SetMenu
GetKeyboardLayoutNameA
ClientToScreen
LoadCursorA
GetIconInfo
IsDialogMessageW
LoadStringA
GetScrollPos
GetWindowLongA
IsIconic
GetClassLongA
GetDesktopWindow
EnumWindows
DestroyIcon
GetSystemMenu
DestroyCursor
OffsetRect
PtInRect
GetMenuState
SetActiveWindow
GetKeyboardLayout
EnumChildWindows
BeginPaint
SetWindowPos
GetKeyboardType
CreateMenu
GetSubMenu
KillTimer
ReleaseCapture
InsertMenuItemA
GetKeyNameTextA
CreateWindowExA
SendMessageW
RemoveMenu
GetCursorPos
CharLowerBuffA
UnhookWindowsHookEx
IsWindowVisible
AdjustWindowRectEx
IsWindow
GetKeyState
SetWindowsHookExA
DestroyWindow
TrackPopupMenu
MoveWindow
EnumThreadWindows
SetParent
EmptyClipboard
DrawEdge
DrawAnimatedRects
DeleteMenu
CharToOemA
SetWindowLongW
GetCursor
CallWindowProcA
ShowOwnedPopups
ScreenToClient
RemovePropA
GetWindowThreadProcessId
GetClipboardData
IsWindowUnicode
DrawFrameControl
ChildWindowFromPoint
GetMenuItemID
wsprintfA
IntersectRect
SetScrollInfo
SystemParametersInfoA
GetSysColor
msvcrt
calloc
tolower
sqrt
cos
fabs
time
memcpy
malloc
kernel32
GetCommandLineA
VirtualQuery
WaitForSingleObject
GetACP
GetLastError
GetTickCount
GetProcAddress
SetEvent
SetEndOfFile
DeleteFileA
ExitProcess
lstrcmpiA
SetErrorMode
GetOEMCP
lstrcpyA
GetEnvironmentStrings
FindClose
GetCurrentThreadId
LoadResource
CreateThread
lstrcatA
CreateEventA
EnterCriticalSection
GetCurrentProcessId
FreeLibrary
GetStdHandle
GetDateFormatA
GetVersionExA
SetHandleCount
MulDiv
GetModuleFileNameA
GetLocaleInfoA
VirtualAlloc
CreateFileA
ExitThread
GlobalAddAtomA
MoveFileA
GetUserDefaultLCID
GlobalDeleteAtom
GetStringTypeA
Sleep
GetSystemDefaultLangID
GlobalFindAtomA
FindFirstFileA
InitializeCriticalSection
SetLastError
FindResourceA
GetCurrentThread
CompareStringA
GetCPInfo
VirtualAllocEx
LoadLibraryA
GetStartupInfoA
GetProcessHeap
MoveFileExA
ResetEvent
GetCurrentProcess
FormatMessageA
HeapDestroy
HeapFree
GetModuleHandleA
GetFileType
GetDiskFreeSpaceA
WriteFile
HeapAlloc
GetThreadLocale
lstrcmpA
GetVersion
LocalAlloc
lstrlenA
RaiseException
LockResource
LoadLibraryExA
GlobalAlloc
FreeResource
EnumCalendarInfoA
SetFilePointer
GetFileAttributesA
LocalReAlloc
WideCharToMultiByte
CloseHandle
SizeofResource
GetStringTypeW
LocalFree
ReadFile
GetLocalTime
lstrcpynA
VirtualFree
DeleteCriticalSection
Sections
CODE Size: 153KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 7KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE