?_MapWindowPoints@@YGPAXPAKPAEPAI@Z
Static task
static1
Behavioral task
behavioral1
Sample
aa49d377881c0457711b3cd5204aea5f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa49d377881c0457711b3cd5204aea5f.exe
Resource
win10v2004-20240226-en
General
-
Target
aa49d377881c0457711b3cd5204aea5f
-
Size
149KB
-
MD5
aa49d377881c0457711b3cd5204aea5f
-
SHA1
08db97682dfffa17376e30aa1707d3a8f0041d66
-
SHA256
cdede1b95b25362b51097ac5a21ec7450118d967000aa80bb49ff9c33b010164
-
SHA512
7161f9a433d373889a1468baad048a5372734626c0c3c8f390bf905a234632a575c889dc2621a3e11cd795edcd06a0e48aca548f4561183aeab05bc3c570b2ad
-
SSDEEP
3072:P3zuYOjZM1izCzxMYxOIGQFrroqraUciSV3Hu11Ri73vNegB7sIF/zPahq73KE1:PjYZJ+zxMY8Itro6aUFG3Huli5eg15zd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa49d377881c0457711b3cd5204aea5f
Files
-
aa49d377881c0457711b3cd5204aea5f.exe windows:5 windows x86 arch:x86
5127e8e86608bcb935a40bcf5c45803d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathMakePrettyA
StrCmpNIW
PathCompactPathW
StrTrimW
StrRStrIW
StrCpyNW
ord158
PathFindNextComponentW
ChrCmpIW
kernel32
CancelWaitableTimer
OpenSemaphoreA
lstrcmpiA
LoadLibraryExW
MoveFileExW
GetModuleFileNameW
GetTapeParameters
FileTimeToDosDateTime
SetMailslotInfo
GetCommModemStatus
SetInformationJobObject
GlobalCompact
IsBadReadPtr
SetMessageWaitingIndicator
SetTapePosition
LoadLibraryA
GetModuleHandleExA
SetupComm
user32
DrawIcon
InvalidateRgn
PostMessageW
LoadImageW
CloseClipboard
EnumDesktopWindows
GetClientRect
SetWinEventHook
SetRect
GetWindowTextW
EnableMenuItem
GetSysColor
MessageBoxW
SystemParametersInfoA
MapWindowPoints
GetDlgCtrlID
CreateCursor
GetPropW
gdi32
PlayEnhMetaFileRecord
SetArcDirection
SetBkColor
GetEnhMetaFileBits
GetRandomRgn
GetTextExtentExPointW
CreateFontIndirectA
GetDeviceCaps
CreateEnhMetaFileA
CreatePolyPolygonRgn
SetViewportExtEx
msvcrt
memset
Exports
Exports
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.icode Size: 1024B - Virtual size: 643B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.m_data Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c_data Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.n_data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 986B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ