Static task
static1
Behavioral task
behavioral1
Sample
a323c508d3c13ab981b258548719eea3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a323c508d3c13ab981b258548719eea3.exe
Resource
win10v2004-20240221-en
General
-
Target
a323c508d3c13ab981b258548719eea3
-
Size
3.8MB
-
MD5
a323c508d3c13ab981b258548719eea3
-
SHA1
074f271cf1f2b0220a430e81a2482b7e3b24eb52
-
SHA256
a3888f9458a6ff5b964d8ff9e5e2c79866982163b67de2d33360b91775f2ddee
-
SHA512
9385c9a321f3ca51d57a8d6a30fbe8985ef12251f64bb623748cfff5585fbf862fc56ccc66114493b5b72666f0d9b6290bf750a9fa4d1eab0a0a2430857cb4f9
-
SSDEEP
98304:ygBfyBJsZbLM/OwW2+0FiMotCBklkWas36lBBbjDMr0t:ygBoJ00/O/2li7GquPMwt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a323c508d3c13ab981b258548719eea3
Files
-
a323c508d3c13ab981b258548719eea3.exe windows:4 windows x86 arch:x86
0167b77fac880d9a12254ad73f871399
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
GetPrivateProfileStringA
HeapDestroy
GetThreadPriority
CreateNamedPipeA
PulseEvent
WriteConsoleInputA
GetExitCodeProcess
OpenFileMappingA
ReplaceFileA
OpenJobObjectA
GetConsoleCommandHistoryLengthA
lstrcpyn
GetProcessId
ConnectNamedPipe
VirtualAllocEx
CopyFileExW
SetCurrentDirectoryA
VirtualLock
WriteConsoleOutputA
GetFileAttributesA
GetProcessIoCounters
GetConsoleMode
lstrlen
Thread32First
GetSystemTime
WriteProcessMemory
CompareFileTime
GetTimeZoneInformation
GetExitCodeThread
GetProcessVersion
GetDllDirectoryA
SetStdHandle
CommConfigDialogA
GetTapeStatus
EnumSystemLanguageGroupsA
GetCurrentActCtx
_lclose
GetStdHandle
GetWindowsDirectoryA
UnlockFile
GlobalReAlloc
MoveFileWithProgressA
GetUserDefaultUILanguage
GetSystemDirectoryA
GetVersion
WriteConsoleOutputCharacterA
Thread32Next
SleepEx
lstrcmpi
GetLogicalDrives
GetConsoleCommandHistoryA
GetComputerNameExA
HeapSize
GetDiskFreeSpaceExA
GetFileType
GetConsoleCursorInfo
GetCommState
GetLocalTime
GetLocaleInfoA
IsBadStringPtrA
GetConsoleFontSize
GetCurrentConsoleFont
GetStringTypeExA
EnumTimeFormatsA
SetConsoleWindowInfo
UnmapViewOfFile
SignalObjectAndWait
HeapUnlock
LocalAlloc
WriteConsoleA
GetModuleFileNameA
HeapReAlloc
FatalExit
GetThreadContext
SetConsoleDisplayMode
WriteConsoleOutputCharacterW
GetCurrentDirectoryA
SetInformationJobObject
GetExpandedNameA
GetConsoleTitleA
DeleteTimerQueue
GetFileTime
GlobalAddAtomA
GlobalFindAtomA
CreateFileMappingA
PulseEvent
MultiByteToWideChar
RequestWakeupLatency
EnumResourceTypesA
CompareStringA
CopyFileExA
FlushConsoleInputBuffer
GetPrivateProfileIntA
GetConsoleOutputCP
ReadConsoleA
CancelWaitableTimer
SetVolumeMountPointA
GetCommTimeouts
ClearCommError
CreateFileMappingA
lstrlenA
WritePrivateProfileStringA
FindResourceExA
WriteConsoleOutputCharacterA
ReadFileEx
PeekNamedPipe
GetTempPathA
OpenFileMappingA
WritePrivateProfileStructA
GetEnvironmentStringsA
EndUpdateResourceA
SetLastError
ReadConsoleInputA
LZClose
FillConsoleOutputCharacterA
RemoveDirectoryA
LocalUnlock
LocalHandle
EnumSystemGeoID
GetDiskFreeSpaceA
WriteConsoleA
FindAtomA
GetTapeParameters
GetLongPathNameA
GetConsoleOutputCP
GetSystemWindowsDirectoryA
ExpandEnvironmentStringsA
SetThreadAffinityMask
SetErrorMode
WriteConsoleInputA
PeekConsoleInputA
FlushViewOfFile
GetConsoleAliasA
SetLocalPrimaryComputerNameA
SetFileApisToOEM
LZOpenFileA
GetPrivateProfileSectionNamesA
GetProfileStringA
PeekConsoleInputA
GetLogicalDriveStringsA
_hread
GetModuleHandleA
GetConsoleWindow
GetModuleHandleA
FindFirstFileA
RegisterWaitForSingleObjectEx
OpenProcess
IsValidCodePage
LZOpenFileA
IsWow64Process
GetFileAttributesExA
ProcessIdToSessionId
IsBadStringPtrA
GetProcessIoCounters
SetLocaleInfoA
WriteConsoleOutputAttribute
Module32Next
GetCommandLineA
GetCurrentProcessId
lstrcat
lstrcpynA
GetWindowsDirectoryA
IsSystemResumeAutomatic
GetProcessTimes
CompareFileTime
RemoveDirectoryA
IsProcessorFeaturePresent
SetFileAttributesA
SetEnvironmentVariableA
VirtualUnlock
VirtualQueryEx
MoveFileExA
FindCloseChangeNotification
PulseEvent
LocalHandle
ReplaceFile
GetConsoleCP
GetProcessAffinityMask
QueryDosDeviceA
SetEndOfFile
WaitCommEvent
GetProcessShutdownParameters
LocalCompact
GetThreadTimes
SetVolumeLabelA
VirtualLock
GlobalAddAtomA
GetNamedPipeHandleStateA
LoadLibraryExA
SetMessageWaitingIndicator
GetModuleFileNameA
IsBadWritePtr
OpenWaitableTimerA
FindFirstFileExA
GetNamedPipeHandleStateA
GetFileSizeEx
GetCurrentProcessId
CreateEventA
GetBinaryTypeA
DisconnectNamedPipe
ReadConsoleOutputAttribute
GetProcessHeap
LZDone
GetLocaleInfoA
GetDateFormatA
user32
CloseWindow
SetMenu
GetWindowInfo
SetWindowsHookExW
GetMenuContextHelpId
BeginDeferWindowPos
EndPaint
ChangeClipboardChain
MapVirtualKeyA
GetNextDlgTabItem
DestroyReasons
SetMenuItemBitmaps
DlgDirSelectComboBoxExA
ClipCursor
LoadCursorFromFileA
TranslateAcceleratorA
CheckDlgButton
GetLastActivePopup
DrawMenuBarTemp
GetTabbedTextExtentA
CreateCursor
SendIMEMessageExA
DrawAnimatedRects
DeregisterShellHookWindow
BeginPaint
GetCaretBlinkTime
DestroyCaret
GetRawInputDeviceInfoA
RegisterClipboardFormatA
ReplyMessage
GetKeyboardLayout
DrawAnimatedRects
GetKeyState
MapWindowPoints
ReplyMessage
LoadRemoteFonts
CliImmSetHotKey
EnableScrollBar
GetMenuItemInfoA
BeginDeferWindowPos
DefWindowProcA
ChangeDisplaySettingsExA
CallWindowProcA
GetCursorFrameInfo
GetKeyboardLayoutList
EnumChildWindows
DrawFrame
GetMenuStringA
TabbedTextOutA
DefRawInputProc
ChangeDisplaySettingsA
GetReasonTitleFromReasonCode
DrawCaptionTempA
AllowSetForegroundWindow
SetMenuContextHelpId
GetClassNameA
UnloadKeyboardLayout
PaintDesktop
CharToOemBuffW
CallWindowProcA
IsHungAppWindow
InsertMenuItemA
SetWindowStationUser
CheckMenuItem
AllowForegroundActivation
ToUnicode
PrivateExtractIconExA
MessageBeep
GetWinStationInfo
RegisterWindowMessageA
UpdateWindow
DragObject
RegisterClipboardFormatA
IsRectEmpty
SetSysColors
GetWindowLongA
IsCharAlphaA
EnableWindow
EnumDisplayDevicesA
GetKeyboardType
GetKeyNameTextA
LoadKeyboardLayoutEx
PtInRect
GetMenuCheckMarkDimensions
GetKeyboardState
LockWindowStation
GetMessagePos
UnhookWindowsHookEx
GetWindow
GetSystemMenu
SetCursorPos
SetSystemCursor
InflateRect
CreateCursor
GetWindowTextLengthA
ShowScrollBar
GetMonitorInfoA
GetClassLongA
SetShellWindowEx
SetWindowsHookExW
UpdateWindow
RegisterClassExW
DlgDirListA
SetSystemMenu
GetDlgItem
CloseDesktop
IsGUIThread
GetMenuItemCount
GetRawInputDeviceInfoA
FindWindowExA
RemovePropA
SetPropA
EnumDisplaySettingsExA
IsCharUpperA
GetMenuItemInfoA
IsCharAlphaNumericA
GetMenuState
FillRect
TranslateMDISysAccel
DestroyWindow
SetMenuItemBitmaps
UnhookWindowsHook
BuildReasonArray
DrawCaption
GetUpdateRgn
EnumClipboardFormats
ToUnicodeEx
OpenClipboard
DrawIconEx
OemToCharBuffW
EqualRect
FrameRect
AlignRects
DefFrameProcA
ModifyMenuA
CreateMDIWindowA
RealGetWindowClassA
TileChildWindows
ToUnicode
IsWindowVisible
BuildReasonArray
SetSystemCursor
SetMenu
GetClassLongA
SetShellWindowEx
GetScrollInfo
UnregisterUserApiHook
EnumPropsExW
DrawStateA
RegisterWindowMessageA
GetClassInfoExW
IsZoomed
ToAsciiEx
SetClipboardViewer
GetTabbedTextExtentA
DispatchMessageA
SendMessageTimeoutA
DrawCaptionTempA
GetWindow
EnumChildWindows
LoadAcceleratorsA
GetLayeredWindowAttributes
TranslateMessage
IsCharLowerA
GetWindowModuleFileNameA
DlgDirSelectExA
GetParent
MessageBoxExA
GetKeyNameTextA
RegisterClassExW
DialogBoxIndirectParamAorW
IsDialogMessage
InSendMessageEx
EnumPropsExA
GetAltTabInfoA
SetMenuDefaultItem
WaitForInputIdle
EnumThreadWindows
GetRegisteredRawInputDevices
ToAscii
DlgDirListComboBoxA
BeginPaint
SendDlgItemMessageA
GetMenuBarInfo
BroadcastSystemMessageA
MessageBoxExA
SetPropA
GetClientRect
TileWindows
PrivateExtractIconsA
SwitchToThisWindow
SendMessageTimeoutA
DeleteMenu
SetWindowLongA
CalcMenuBar
InvalidateRgn
SendDlgItemMessageA
EnumDesktopsA
GetMenuState
LoadImageA
DrawIconEx
SetLayeredWindowAttributes
InsertMenuItemA
tapi32
lineDrop
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 8.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ