Static task
static1
Behavioral task
behavioral1
Sample
524bb6e938ab8a41bcb8c2549324b305.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
524bb6e938ab8a41bcb8c2549324b305.exe
Resource
win10v2004-20231222-en
General
-
Target
524bb6e938ab8a41bcb8c2549324b305
-
Size
608KB
-
MD5
524bb6e938ab8a41bcb8c2549324b305
-
SHA1
b0061f30b9d55bd557264dc833a40a568a2e8b8c
-
SHA256
3f5aba2888c0f9ccfa64139b4c2d5e96bfd2af07bca8db8a8fc291ba19263ca0
-
SHA512
4d8bc27098824f5576638dee9e9d27592a5f9f7f1a1e16df7a3497945d783893a844356ec3b360f2f48a2cbcb8a7c8bebf7aceceb7861ec8f756267e8f93d6cb
-
SSDEEP
12288:axeVBmkUS6NzPvNarQOCrDKMnN1va7oy6NGjvLbk99egakz:aQVAXNNBmQO+DKG67tsGjvLu9egakz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 524bb6e938ab8a41bcb8c2549324b305
Files
-
524bb6e938ab8a41bcb8c2549324b305.exe windows:4 windows x86 arch:x86
5447d1c7d31ac9048f4baa73fa77a2f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetDlgItemTextA
CreateAcceleratorTableA
AttachThreadInput
DdeGetLastError
RegisterClassA
InSendMessage
ActivateKeyboardLayout
CreateIconFromResourceEx
DestroyIcon
SetMenuDefaultItem
GetListBoxInfo
SetClassLongW
ChildWindowFromPoint
EnumDisplaySettingsA
CharUpperW
RegisterClassExA
AppendMenuA
DdeReconnect
FindWindowW
CloseClipboard
OemToCharA
InsertMenuItemW
IsCharUpperW
kernel32
GetPrivateProfileIntA
GetStartupInfoW
GetConsoleScreenBufferInfo
GetTimeZoneInformation
WideCharToMultiByte
GetUserDefaultLCID
LCMapStringA
UnhandledExceptionFilter
VirtualAlloc
GetTickCount
FreeLibrary
WriteConsoleA
EnumTimeFormatsA
WriteConsoleW
ReleaseSemaphore
IsValidCodePage
GetConsoleMode
LCMapStringW
GetStringTypeW
GetModuleFileNameW
QueryPerformanceCounter
CreateToolhelp32Snapshot
FreeEnvironmentStringsW
WriteConsoleInputA
GetModuleFileNameA
SetFilePointer
OpenMutexA
VirtualFree
HeapFree
TlsAlloc
CompareStringW
GetStartupInfoA
UnlockFile
GetCurrentProcess
FindFirstFileW
TlsFree
WriteFile
TlsSetValue
HeapAlloc
GetModuleHandleW
ReadFile
GetSystemTimeAsFileTime
lstrcmp
CompareStringA
HeapReAlloc
GetCommandLineW
OpenSemaphoreW
SetEnvironmentVariableA
GetProcAddress
GetACP
CreateMutexA
GetFileType
EnumSystemLocalesA
TlsGetValue
MultiByteToWideChar
RemoveDirectoryW
SetUnhandledExceptionFilter
WaitForMultipleObjects
SetLastError
RtlFillMemory
GetTimeFormatA
VirtualFreeEx
HeapCreate
GetNamedPipeHandleStateA
GetEnvironmentStringsW
VirtualAllocEx
Sleep
GetConsoleCP
GlobalLock
GetCPInfo
GetLocaleInfoA
GetStringTypeA
GetCommandLineA
TerminateProcess
GetLastError
SetConsoleCtrlHandler
GetDateFormatA
IsDebuggerPresent
InterlockedExchange
InterlockedDecrement
HeapDestroy
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
HeapSize
LoadLibraryA
IsValidLocale
GetSystemDirectoryW
RtlUnwind
GetDiskFreeSpaceExW
GetStdHandle
WriteProfileSectionA
ResetEvent
ExitProcess
GetConsoleOutputCP
DeleteCriticalSection
SetStdHandle
GetPrivateProfileStringW
FlushFileBuffers
LeaveCriticalSection
EnterCriticalSection
EnumResourceLanguagesA
GetCurrentThread
GetProcessAffinityMask
GetCurrentProcessId
CreateFileA
InterlockedIncrement
lstrcmpi
CreateProcessW
SetHandleCount
CloseHandle
GetModuleHandleA
VirtualQuery
GetLocaleInfoW
PulseEvent
GetOEMCP
comctl32
DrawStatusText
DrawInsert
CreateToolbarEx
ImageList_DragEnter
InitCommonControlsEx
CreateStatusWindow
ImageList_GetImageInfo
ImageList_ReplaceIcon
ImageList_Write
CreateStatusWindowA
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ