Static task
static1
Behavioral task
behavioral1
Sample
554220a201d1c586f1933aca23a6cab1c0b5ae83f06353ace41256085a0305ee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
554220a201d1c586f1933aca23a6cab1c0b5ae83f06353ace41256085a0305ee.exe
Resource
win10v2004-20231215-en
General
-
Target
554220a201d1c586f1933aca23a6cab1c0b5ae83f06353ace41256085a0305ee
-
Size
3.9MB
-
MD5
30924ec776fb26dcf0c9a844c877bdb6
-
SHA1
6ccde1b437ba67890ea043e437434600d75ad4c2
-
SHA256
554220a201d1c586f1933aca23a6cab1c0b5ae83f06353ace41256085a0305ee
-
SHA512
0155a7acf2b93be234d340d53e1fe97ce15b60ec4986cf7b9f54a674539ed87260fffb39e64398da679a81cf880e5329c098111db1cf6c77a344e5f08305f242
-
SSDEEP
24576:sulGkDG6gu3Vz3XICf5zWagmDwMciCe5xtI7VzlVijy77LYFWLq5g5h1LWoLjYol:sWGZu3l3YC0A5xtIdNaBnclG4hb6Qz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 554220a201d1c586f1933aca23a6cab1c0b5ae83f06353ace41256085a0305ee
Files
-
554220a201d1c586f1933aca23a6cab1c0b5ae83f06353ace41256085a0305ee.exe windows:4 windows x86 arch:x86
667f37738edbbf54ea02359b6912d5fd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateWindowExA
MessageBoxA
SetPropA
EnumChildWindows
SendMessageA
GetMessageA
GetAncestor
EnumWindows
TranslateMessage
GetClassNameA
GetWindowLongA
GetWindowRect
GetDC
UpdateLayeredWindow
ReleaseDC
IsWindow
ShowWindow
CallWindowProcA
TrackMouseEvent
GetPropA
wsprintfA
GetSystemMetrics
GetCursorPos
CloseClipboard
GetClipboardData
OpenClipboard
DispatchMessageA
PeekMessageA
EnableMenuItem
GetSubMenu
GetDlgCtrlID
UnregisterClassA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
GetMessageA
WindowFromPoint
DrawFocusRect
DrawEdge
DrawFrameControl
TranslateMessage
LoadIconA
CharUpperA
GetForegroundWindow
GetDesktopWindow
GetClassNameA
GetWindowThreadProcessId
FindWindowA
GetDlgItem
GetWindowTextA
IsIconic
SetFocus
GetActiveWindow
GetWindow
DestroyAcceleratorTable
SetWindowRgn
GetMessagePos
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
WinHelpA
KillTimer
SetTimer
ReleaseCapture
ClientToScreen
SetCapture
GetScrollRange
SetScrollRange
SetScrollPos
SetRect
InflateRect
IntersectRect
DestroyIcon
PtInRect
OffsetRect
IsWindowVisible
EnableWindow
RedrawWindow
GetWindowLongA
SetWindowLongA
GetSysColor
SetActiveWindow
SetCursorPos
LoadCursorA
IsWindowEnabled
GetDC
FillRect
IsRectEmpty
ReleaseDC
IsChild
DestroyMenu
SetForegroundWindow
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
GetFocus
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBoxA
GetCursorPos
GetSystemMetrics
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
WaitForInputIdle
EnumDisplaySettingsA
LoadImageA
SystemParametersInfoA
GetCapture
ShowWindow
GetWindowTextLengthA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
TranslateAcceleratorA
GetKeyState
CopyAcceleratorTableA
PostQuitMessage
IsZoomed
GetClassInfoA
DefWindowProcA
GetSystemMenu
DeleteMenu
GetMenu
SetMenu
SetCursor
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
SetWindowTextA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
LoadStringA
GetSysColorBrush
PeekMessageA
CreateAcceleratorTableA
kernel32
FreeEnvironmentStringsW
FreeEnvironmentStringsA
DeleteCriticalSection
GetEnvironmentStrings
GetEnvironmentStringsW
GetStartupInfoA
GetFileType
GetStdHandle
WriteFile
GetCPInfo
SetHandleCount
GetACP
GetCommandLineA
GetVersion
RtlUnwind
TerminateProcess
HeapReAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
SetFilePointer
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringW
SetStdHandle
GetCurrentProcess
FlushFileBuffers
IsBadWritePtr
RaiseException
HeapCreate
HeapDestroy
GetVersionExA
LCMapStringA
LoadLibraryA
FreeLibrary
GetCurrentDirectoryA
GetLocalTime
Sleep
GetFileSize
ReadFile
GetTempPathA
GetTickCount
CreateFileA
GetOEMCP
CloseHandle
GetModuleFileNameA
IsBadReadPtr
HeapFree
GetEnvironmentVariableA
HeapAlloc
ExitProcess
GetProcessHeap
VirtualFree
VirtualAlloc
GetProcAddress
LoadLibraryW
MapViewOfFile
CreateFileMappingA
VirtualProtectEx
WideCharToMultiByte
LocalAlloc
LocalSize
lstrlenW
GlobalFree
MultiByteToWideChar
GlobalUnlock
GlobalLock
GlobalAlloc
LocalFree
RtlMoveMemory
GetModuleHandleA
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
GetSystemTime
ExitThread
RtlUnwind
GetOEMCP
GetCPInfo
GetProcessVersion
SetErrorMode
GlobalFlags
GetCurrentThread
GetFileTime
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
SetEndOfFile
UnlockFile
LockFile
CloseHandle
WaitForSingleObject
CreateProcessA
GetTickCount
GetCommandLineA
MulDiv
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
CreateDirectoryA
DeleteFileA
MoveFileA
GetFileAttributesA
SetFileAttributesA
FindClose
FindFirstFileA
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
CreateEventA
CreateThread
WritePrivateProfileStringA
GetVersionExA
GetLastError
LoadLibraryA
FreeLibrary
GetFullPathNameA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
lstrlenA
lstrcatA
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
ExitProcess
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameA
ReadFile
LockResource
LoadResource
FindResourceA
SetEvent
CreateFileA
WaitForMultipleObjects
WriteFile
GetProfileStringA
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
ResumeThread
CreateSemaphoreA
MapViewOfFile
CreateFileMappingA
LocalFree
TerminateThread
UnmapViewOfFile
FormatMessageA
IsDBCSLeadByte
lstrcmpA
lstrcmpiA
SetEnvironmentVariableA
FileTimeToSystemTime
FileTimeToLocalFileTime
SetFilePointer
GetFileSize
GetFileType
DuplicateHandle
GetCurrentProcess
SystemTimeToFileTime
GetLocalTime
DosDateTimeToFileTime
SetFileTime
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
SetLastError
GetTimeZoneInformation
GetVersion
LCMapStringA
LCMapStringW
VirtualAlloc
FlushFileBuffers
InterlockedDecrement
InterlockedIncrement
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
InterlockedExchange
GetStartupInfoA
lstrcpynA
gdi32
CreateCompatibleDC
DeleteDC
CreateDIBSection
DeleteObject
SelectObject
LineTo
MoveToEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
GetStockObject
CreateSolidBrush
FillRgn
CreateRectRgn
CombineRgn
PatBlt
CreatePen
GetObjectA
SelectObject
CreateBitmap
CreateDCA
CreateCompatibleBitmap
GetPolyFillMode
GetStretchBltMode
GetROP2
GetBkColor
GetBkMode
GetTextColor
ExtSelectClipRgn
GetViewportExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextMetricsA
CreateFontIndirectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
BitBlt
CreateCompatibleDC
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
GetTextExtentPoint32A
SetTextColor
GetDeviceCaps
GetDIBits
RealizePalette
SelectPalette
StretchBlt
CreatePalette
GetSystemPaletteEntries
CreateDIBitmap
DeleteObject
SelectClipRgn
CreatePolygonRgn
GetClipRgn
SetStretchBltMode
CreateRectRgnIndirect
SetBkColor
CreateRoundRectRgn
CreateEllipticRgn
PathToRegion
EndPath
BeginPath
GetWindowOrgEx
GetViewportOrgEx
GetWindowExtEx
gdiplus
GdipCreateFromHDC
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipSetSmoothingMode
GdipGetImageHeight
GdipGetImageWidth
GdiplusStartup
GdipGetRegionBounds
GdipSetTextRenderingHint
GdipDeletePen
GdipDrawRectangleI
GdipSetSolidFillColor
GdipDeleteBrush
GdipLoadImageFromFile
GdipCreateSolidFill
GdipDisposeImage
GdipLoadImageFromStream
ole32
CreateStreamOnHGlobal
CLSIDFromString
OleUninitialize
OleInitialize
CLSIDFromString
imm32
ImmAssociateContext
ImmGetCompositionStringW
ImmReleaseContext
ImmSetCompositionWindow
ImmGetContext
shell32
SHAppBarMessage
ShellExecuteA
Shell_NotifyIconA
ShellExecuteA
shlwapi
PathFileExistsA
winmm
PlaySoundA
waveOutPause
waveOutWrite
waveOutPrepareHeader
waveOutReset
waveOutClose
waveOutGetNumDevs
waveOutOpen
midiOutUnprepareHeader
midiStreamOpen
midiStreamOut
waveOutUnprepareHeader
midiStreamStop
midiOutReset
midiStreamClose
midiStreamRestart
midiOutPrepareHeader
midiStreamProperty
ws2_32
bind
htons
WSAAsyncSelect
closesocket
send
select
WSACleanup
gethostbyname
inet_ntoa
inet_addr
gethostname
ntohs
getsockname
socket
recvfrom
ioctlsocket
connect
recv
listen
__WSAFDIsSet
accept
WSAStartup
WSAGetLastError
getpeername
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueA
oleaut32
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
comctl32
ImageList_Destroy
ord17
comdlg32
GetSaveFileNameA
GetOpenFileNameA
ChooseColorA
GetFileTitleA
Sections
.text Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 600KB - Virtual size: 598KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 388KB - Virtual size: 594KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ