Static task
static1
Behavioral task
behavioral1
Sample
58dc0a68a7f6559d179d8f21a2b1e718.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58dc0a68a7f6559d179d8f21a2b1e718.exe
Resource
win10v2004-20231222-en
General
-
Target
58dc0a68a7f6559d179d8f21a2b1e718
-
Size
508KB
-
MD5
58dc0a68a7f6559d179d8f21a2b1e718
-
SHA1
1a4d4f0ef9eb709935b7a5026f578c958ccc44b7
-
SHA256
1c4a41a69cb4eb0646437b05c7570e855d34414cd7244eadac3568ac3f4b02f3
-
SHA512
66e3e2dfdb646a3117481024b9f8fe90644e5bd7d671c51a2cfc503640a49899f6e330c26363a88f1c0eba46f6187c720fc65132e3e33479811d2000396c1b65
-
SSDEEP
12288:O5Wg0w2n9X1wmSlLVQ2wb/CQiKhI3Q4vW3KqKOj7DPGmMMnMMMMMJ:OQT9Fwrl+Lb/CQi5O3KqKenemMMnMMMt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 58dc0a68a7f6559d179d8f21a2b1e718
Files
-
58dc0a68a7f6559d179d8f21a2b1e718.exe windows:4 windows x86 arch:x86
d75141d3e8ec3a11b96e078d371e8be7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleLoad
OleSave
user32
LoadStringA
GetPropA
SetCapture
EnableMenuItem
ShowScrollBar
EnableWindow
GetCaretPos
SetCaretPos
CallNextHookEx
GetWindow
ClipCursor
ShowCursor
DestroyCaret
GetClassNameA
WaitMessage
GetWindowLongA
CreatePopupMenu
DestroyIcon
ReleaseDC
DialogBoxParamA
WindowFromPoint
DrawMenuBar
DeferWindowPos
GetClassInfoExA
SetWindowLongA
SendDlgItemMessageA
CharPrevA
UnregisterClassA
LoadAcceleratorsA
KillTimer
IsWindow
GetScrollPos
WinHelpA
GetClassInfoA
BeginDeferWindowPos
GetIconInfo
LockWindowUpdate
OffsetRect
SetFocus
SetWindowsHookExW
FrameRect
SetKeyboardState
GetClipboardFormatNameA
EndDeferWindowPos
SetActiveWindow
DdeCreateStringHandleA
DdeSetUserHandle
GetMenu
ClientToScreen
TranslateMessage
DefWindowProcA
AdjustWindowRect
MapWindowPoints
LoadCursorA
TrackPopupMenu
IsCharAlphaA
GetWindowTextLengthA
PeekMessageA
EndDialog
IsClipboardFormatAvailable
GetMenuItemCount
DestroyWindow
SetTimer
DdeNameService
GetMessagePos
CharToOemBuffA
GetMenuItemID
CharToOemA
GetActiveWindow
GetMessageTime
SetScrollInfo
IntersectRect
CharLowerBuffW
ShowCaret
InsertMenuA
SetMenu
IsRectEmpty
SetCursorPos
SendMessageA
ShowWindow
BeginPaint
FindWindowW
MessageBoxA
GetParent
GetKeyState
AttachThreadInput
UnhookWindowsHookEx
InvalidateRect
DdePostAdvise
AdjustWindowRectEx
PostQuitMessage
VkKeyScanA
GetClientRect
GetFocus
DestroyAcceleratorTable
ModifyMenuA
RemovePropA
FindWindowA
FillRect
GetAsyncKeyState
UpdateWindow
MessageBeep
DdeCmpStringHandles
GetSystemMetrics
GetDlgItem
RegisterClipboardFormatA
SetMenuDefaultItem
GetSystemMenu
GetUpdateRgn
GetScrollInfo
GetClipboardData
SetPropA
DdeFreeStringHandle
VkKeyScanW
TranslateMDISysAccel
GetKeyboardLayout
GetWindowDC
SetScrollPos
wsprintfA
CreateDialogParamA
ScreenToClient
GetLastActivePopup
GetMenuStringA
IsIconic
GetSubMenu
IsChild
GetDesktopWindow
PostThreadMessageA
CopyAcceleratorTableA
PostMessageW
DdeQueryConvInfo
PeekMessageW
GetWindowTextA
DdeInitializeA
EnumThreadWindows
DispatchMessageA
SetClipboardData
CharLowerBuffA
DdeGetData
DdeQueryStringA
SetWindowPos
AppendMenuA
IsDialogMessageA
CheckMenuItem
DefFrameProcA
CallWindowProcA
GetWindowRect
SetMenuItemInfoA
GetQueueStatus
LoadIconA
DrawFocusRect
GetWindowThreadProcessId
RemoveMenu
DefMDIChildProcA
MoveWindow
CreateWindowExA
LoadImageA
GetKeyboardState
CharNextA
BringWindowToTop
DdeDisconnect
GetForegroundWindow
GetCursor
LoadBitmapA
GetCursorPos
GetCaretBlinkTime
EmptyClipboard
GetWindowRgn
GetSysColor
CharLowerA
MsgWaitForMultipleObjects
ReleaseCapture
MessageBoxIndirectA
GetMenuState
GetDoubleClickTime
PtInRect
CharUpperBuffA
SetParent
SubtractRect
SetForegroundWindow
InvalidateRgn
GetUpdateRect
SetCursor
CreateAcceleratorTableA
ToAscii
IsZoomed
SetWindowsHookExA
CloseClipboard
SetWindowTextA
EqualRect
CharUpperBuffW
EnumClipboardFormats
DdeUninitialize
DrawFrameControl
OpenClipboard
CharUpperA
IsWindowEnabled
RegisterClassExA
DrawTextA
GetCapture
DdeConnect
DestroyMenu
DeleteMenu
DdeAbandonTransaction
CopyRect
SetRect
SetWindowContextHelpId
IsWindowVisible
SetScrollRange
SystemParametersInfoA
DdeFreeDataHandle
RegisterClassA
CreateCaret
DdeClientTransaction
CreateMenu
PostMessageA
GetDC
EndPaint
GetTabbedTextExtentA
GetDCEx
SetDlgItemTextA
WaitForInputIdle
CreateIcon
DestroyCursor
DrawIcon
DdeCreateDataHandle
TabbedTextOutA
SetWindowRgn
HideCaret
keybd_event
GetMenuItemInfoA
InflateRect
OemToCharA
CreateCursor
DdeGetLastError
samlib
SamConnect
SamConnectWithCreds
ddraw
DirectDrawEnumerateA
advapi32
RegDeleteValueA
RegDeleteValueW
RegSetValueExW
RegCreateKeyA
DeregisterEventSource
RegSetValueA
RegOpenKeyW
AdjustTokenPrivileges
LookupPrivilegeValueA
InitializeSecurityDescriptor
RegOpenKeyExA
RegDeleteKeyW
SetSecurityDescriptorDacl
RegQueryValueExW
RegQueryValueA
RegEnumKeyA
RegQueryValueExA
OpenProcessToken
RegDeleteKeyA
RegSetValueExA
RegCreateKeyW
RegEnumValueA
RegisterEventSourceA
RegCloseKey
RegQueryInfoKeyA
RegEnumValueW
RegOpenKeyA
RegEnumKeyW
ReportEventA
ws2_32
WSAConnect
setsockopt
kernel32
FormatMessageA
lstrcpyA
VirtualAlloc
GetModuleHandleA
HeapDestroy
IsBadReadPtr
GetVersionExA
GetCommandLineA
GetCPInfo
GetCurrentDirectoryA
LoadLibraryExA
GetStringTypeA
GetModuleFileNameA
GlobalSize
RaiseException
RemoveDirectoryA
TlsAlloc
SetFileTime
_lwrite
GetLocaleInfoA
CompareStringW
lstrlenA
GetFileAttributesA
DuplicateHandle
WriteFile
GetUserDefaultLCID
GetStringTypeExA
SetLastError
IsDBCSLeadByte
LockResource
SetStdHandle
InterlockedIncrement
Sleep
LoadResource
GetSystemTime
VirtualQuery
FindClose
GetSystemDefaultLCID
lstrcatA
InitializeCriticalSection
LCMapStringW
WideCharToMultiByte
SetCurrentDirectoryA
GetCurrentProcess
GetStdHandle
SizeofResource
TerminateProcess
FreeEnvironmentStringsA
LoadLibraryA
SetFilePointer
WinExec
GetTimeZoneInformation
lstrcmpiW
GlobalHandle
SetLocalTime
GetWindowsDirectoryA
HeapCreate
GetStartupInfoA
ReadFile
lstrcmpA
VirtualFree
EnterCriticalSection
ReleaseSemaphore
GlobalReAlloc
FindResourceA
GlobalFree
GetSystemDirectoryA
GetACP
WaitForSingleObject
FlushFileBuffers
FormatMessageW
CreateThread
CompareStringA
GlobalAddAtomA
DeleteCriticalSection
HeapReAlloc
CreateSemaphoreA
FlushInstructionCache
CreateEventA
DeleteFileA
GetSystemInfo
ExitThread
SystemTimeToFileTime
GetFileType
GetExitCodeProcess
MulDiv
InterlockedDecrement
GlobalUnlock
SetEndOfFile
lstrcpynA
SearchPathA
MoveFileA
GetVolumeInformationA
UnlockFile
GlobalAlloc
GetOEMCP
GetEnvironmentStringsW
HeapAlloc
FreeLibrary
UnhandledExceptionFilter
GetCurrentProcessId
VirtualProtect
GetDriveTypeA
FreeEnvironmentStringsW
TlsSetValue
GetLocalTime
FreeResource
GetShortPathNameA
CloseHandle
IsBadCodePtr
RtlUnwind
_lread
CreateFileA
GlobalDeleteAtom
lstrcmpiA
HeapSize
_lclose
_llseek
LockFile
MultiByteToWideChar
ResetEvent
FindFirstFileA
FileTimeToLocalFileTime
GetModuleFileNameW
GetStringTypeW
GetProcAddress
GetTempFileNameA
FileTimeToSystemTime
GetFullPathNameA
ExitProcess
TlsFree
ResumeThread
GetTickCount
SetEvent
SetFileAttributesA
GetUserDefaultLangID
GetProfileStringA
GetVersion
LCMapStringA
TlsGetValue
CreateDirectoryA
SetEnvironmentVariableA
GetEnvironmentStrings
SetErrorMode
LeaveCriticalSection
GetDateFormatA
SetHandleCount
GlobalLock
GetTempPathA
GetLastError
FindNextFileA
CreateProcessW
GetSystemDefaultLangID
HeapFree
GetCurrentThreadId
GetFileTime
CreateProcessA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 457KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ