Static task
static1
Behavioral task
behavioral1
Sample
c94d5915ae089d2406312381ab26301c9dc39f12ce74052a5ce9af101febb02b.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c94d5915ae089d2406312381ab26301c9dc39f12ce74052a5ce9af101febb02b.exe
Resource
win10v2004-20231215-en
General
-
Target
c94d5915ae089d2406312381ab26301c9dc39f12ce74052a5ce9af101febb02b
-
Size
316KB
-
MD5
550d8e942bc6ff6df84e5d7386b0d8d4
-
SHA1
79d923943843c4391a1af6e54b36adbdc41b7c6e
-
SHA256
c94d5915ae089d2406312381ab26301c9dc39f12ce74052a5ce9af101febb02b
-
SHA512
55e6df7d0be5e9e32ab5d9cdbe0d02f020f12eba1d4b7699737cbce7a99a83dba8fe6de5278bc943b58b95a6b05a9a3607ab1e6a31d921220be931dc0d04af05
-
SSDEEP
6144:8EYcbE7U4u6YDPkeEskNrKG0uch0GT7zUa:stYDgDNrKhH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c94d5915ae089d2406312381ab26301c9dc39f12ce74052a5ce9af101febb02b
Files
-
c94d5915ae089d2406312381ab26301c9dc39f12ce74052a5ce9af101febb02b.exe windows:4 windows x86 arch:x86
27f8c9fd5b24e7747ef0ca74ee4e1906
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
Sleep
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileA
GetShortPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
CloseHandle
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalFree
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GetCurrentThreadId
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
FreeResource
GlobalLock
GlobalUnlock
GetCurrentProcessId
GetModuleHandleA
GlobalGetAtomNameA
GlobalAddAtomA
SetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersion
CompareStringA
lstrcmpiA
GetLastError
InterlockedExchange
GetStringTypeExA
MultiByteToWideChar
CompareStringW
WideCharToMultiByte
lstrlenA
GetProcAddress
LoadLibraryA
GetCurrentProcess
WaitForSingleObject
GetEnvironmentStrings
GetModuleFileNameA
user32
GrayStringA
GetWindowDC
BeginPaint
EndPaint
GetSysColorBrush
FindWindowA
SetTimer
KillTimer
SetRect
WindowFromPoint
GetDCEx
LockWindowUpdate
UnregisterClassA
DestroyIcon
PostQuitMessage
InsertMenuA
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
DispatchMessageA
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetForegroundWindow
MessageBoxA
GetClassInfoExA
DrawTextExA
AdjustWindowRectEx
DeferWindowPos
DefWindowProcA
CallWindowProcA
GetWindowPlacement
GetMenuStringA
SystemParametersInfoA
GetMenuItemInfoA
UnhookWindowsHookEx
SetParent
GetSystemMenu
AppendMenuA
DeleteMenu
IsRectEmpty
IsZoomed
GetSystemMetrics
GetCursorPos
LoadCursorA
DestroyCursor
BeginDeferWindowPos
EndDeferWindowPos
SetCursorPos
CreateWindowExA
SetScrollPos
GetScrollPos
IsChild
SetCapture
RedrawWindow
ReleaseDC
GetDC
ScreenToClient
ClientToScreen
GetClientRect
GetWindowRect
InflateRect
PtInRect
RegisterWindowMessageA
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
GetClassNameA
GetSysColor
WinHelpA
EnumWindows
GetMenu
ModifyMenuA
SetWindowPos
SetFocus
GetWindowThreadProcessId
IsWindowEnabled
GetFocus
EqualRect
GetDlgItem
SetWindowLongA
GetKeyState
GetDlgCtrlID
LoadIconA
SetCursor
PeekMessageA
GetCapture
ReleaseCapture
DrawTextA
TabbedTextOutA
FillRect
ShowOwnedPopups
GetMessageA
TranslateMessage
ValidateRect
CreateDialogIndirectParamA
GetNextDlgTabItem
RegisterClassA
EndDialog
CharUpperA
UpdateWindow
GetActiveWindow
EnableWindow
TranslateAcceleratorA
IsWindow
GetWindowLongA
ShowWindow
GetWindow
GetDesktopWindow
SetMenu
PostMessageA
BringWindowToTop
GetLastActivePopup
CopyRect
SetRectEmpty
OffsetRect
IntersectRect
LoadAcceleratorsA
GetParent
SetActiveWindow
IsWindowVisible
InvalidateRect
IsIconic
SendMessageA
InsertMenuItemA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
GetClassInfoA
gdi32
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreatePatternBrush
PtVisible
CreateSolidBrush
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetBkColor
GetPixel
CreateRectRgn
SelectClipRgn
GetStockObject
CreateCompatibleBitmap
IntersectClipRect
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
ExtTextOutA
BitBlt
CreateFontIndirectA
StretchDIBits
DeleteDC
GetObjectA
CreateFontA
GetCharWidthA
DeleteObject
GetTextExtentPoint32A
GetTextMetricsA
SelectObject
PatBlt
CreateCompatibleDC
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
GetFileSecurityA
SetFileSecurityA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegSetValueA
RegCloseKey
RegCreateKeyA
shell32
DragQueryFileA
ExtractIconA
SHGetFileInfoA
DragFinish
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oleaut32
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 228KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 398KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ