Static task
static1
Behavioral task
behavioral1
Sample
49923012be652d6b78030ae378b042e0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49923012be652d6b78030ae378b042e0.exe
Resource
win10v2004-20231215-en
General
-
Target
49923012be652d6b78030ae378b042e0
-
Size
620KB
-
MD5
49923012be652d6b78030ae378b042e0
-
SHA1
2edff0ea71a2a444af859421fc5bc4152407c8b2
-
SHA256
c79bd140efc64993aa8aad8afafeb00e410e74146d39b2327cb4bba57aaf0717
-
SHA512
75f222b5ffff7017f4e4345038eca530da41991cf93673b09173c7bf9196df150412925f82c8a21e743b16fc25ad144516decbd1b33242ac5fb1a9eada77cef9
-
SSDEEP
12288:nThdJr41euOGUA81PJOlP8IC8QIzqW3Qb6zHR8TPtfOB:nTHl41JOGUr1PJHIC8QfXb6zHqTMB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49923012be652d6b78030ae378b042e0
Files
-
49923012be652d6b78030ae378b042e0.exe windows:5 windows x86 arch:x86
d18771d7a4b65bfa3f42b7ee49d6b052
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetQueryDataAvailable
InternetCloseHandle
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetGetLastResponseInfoA
HttpQueryInfoA
HttpAddRequestHeadersA
InternetGetCookieA
InternetSetCookieA
InternetSetOptionExA
InternetOpenUrlA
InternetOpenA
InternetGetConnectedState
kernel32
GetFileAttributesA
GetFileSizeEx
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
GetModuleHandleW
SetErrorMode
RtlUnwind
HeapFree
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitProcess
GetSystemTimeAsFileTime
GetStartupInfoA
VirtualProtect
VirtualAlloc
VirtualQuery
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
HeapCreate
VirtualFree
GetStdHandle
GetTimeZoneInformation
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
MoveFileA
InterlockedIncrement
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
GetThreadLocale
InterlockedDecrement
GetModuleFileNameW
WritePrivateProfileStringA
WaitForSingleObject
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
InterlockedExchange
lstrcmpA
GetCurrentProcessId
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
SetLastError
lstrcmpW
GetModuleHandleA
GetVersionExA
lstrlenW
lstrcpynA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileMappingA
FindFirstFileA
FindNextFileA
GetModuleFileNameA
ReadFile
CreateDirectoryA
WriteFile
lstrlenA
MultiByteToWideChar
CreateMutexA
GetCommandLineA
GetLocalTime
OpenFileMappingA
MapViewOfFile
lstrcpyA
UnmapViewOfFile
DeleteFileA
OpenProcess
TerminateProcess
CloseHandle
GetTickCount
Sleep
CreateFileA
FindClose
GetFileTime
FileTimeToSystemTime
GetLastError
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetSystemInfo
user32
DestroyMenu
CharUpperA
CharNextA
RegisterClipboardFormatA
SetWindowContextHelpId
MapDialogRect
SetCursor
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
IsWindowEnabled
ShowWindow
MoveWindow
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetPropA
RemovePropA
GetFocus
SetFocus
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
SetCapture
GetKeyState
SetMenu
SetForegroundWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
SetCursorPos
EnumChildWindows
GetWindow
GetParent
SetWindowsHookExA
CallNextHookEx
UnhookWindowsHookEx
GetMessageA
MessageBoxA
IsWindow
RegisterWindowMessageA
UnregisterClassA
PostThreadMessageA
MessageBeep
GetWindowLongA
SetWindowLongA
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
SetPropA
ReleaseCapture
SetWindowTextA
GetSystemMetrics
LoadIconA
KillTimer
SetTimer
IsIconic
PostMessageA
DrawIcon
GetCursorPos
WindowFromPoint
GetWindowTextA
GetClassNameA
SetWindowPos
BringWindowToTop
FindWindowA
GetWindowThreadProcessId
PeekMessageA
TranslateMessage
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
DeferWindowPos
SendMessageA
IsWindowVisible
InvalidateRect
UpdateWindow
GetClientRect
GetWindowRect
LoadBitmapA
EqualRect
EnableWindow
LoadCursorA
GetSysColorBrush
MapWindowPoints
gdi32
GetStockObject
SetViewportOrgEx
CreateRectRgnIndirect
GetTextColor
GetMapMode
GetRgnBox
GetBkColor
SelectObject
Escape
ExtTextOutA
TextOutA
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
GetObjectA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
ExcludeClipRect
SetMapMode
OffsetViewportOrgEx
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegFlushKey
RegOpenKeyExA
CryptAcquireContextA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptReleaseContext
shell32
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathIsURLA
oledlg
ord8
ole32
CLSIDFromProgID
CoCreateInstance
CoInitialize
CoUninitialize
CoCreateGuid
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoDisconnectObject
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocStringLen
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantCopy
VariantChangeType
SysStringLen
SysAllocStringByteLen
SafeArrayDestroy
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysAllocString
VariantInit
VariantClear
SysFreeString
LoadTypeLi
Sections
.text Size: 492KB - Virtual size: 491KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ