Static task
static1
Behavioral task
behavioral1
Sample
acc807542d520e748ba4f34f65552eb4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acc807542d520e748ba4f34f65552eb4.exe
Resource
win10v2004-20240226-en
General
-
Target
acc807542d520e748ba4f34f65552eb4
-
Size
636KB
-
MD5
acc807542d520e748ba4f34f65552eb4
-
SHA1
306861957883eccd461079b192aff2ae3e22022b
-
SHA256
cafcf3b0ad8170a485e52796d74faf1407c76be98987f794850f768d0cdae2a1
-
SHA512
055a3f4b44eeed7b1ffaf43a967d9f57b7aff09867a9c2aecbd8613476ea28b297801d52328bb20e6aafb22651a84f04cd858210771229f11543ef2b22be4edd
-
SSDEEP
12288:/0bnXwt4oWev/ROwMZuOF+CnubFNSzhZzmwK5PJ2n:NtPWegw7OBSSzhZzbv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource acc807542d520e748ba4f34f65552eb4
Files
-
acc807542d520e748ba4f34f65552eb4.exe windows:5 windows x86 arch:x86
27f4ec0a07e5164d77b936fcc873b1e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
SearchPathA
GetEnvironmentVariableA
GetSystemDirectoryA
GetWindowsDirectoryA
SizeofResource
FlushFileBuffers
SetFileAttributesA
FreeResource
FormatMessageA
MulDiv
SetPriorityClass
GetPriorityClass
GetCurrentProcess
GetVersionExA
GlobalMemoryStatus
GetLocaleInfoA
QueryPerformanceCounter
GetTimeFormatA
CompareFileTime
SystemTimeToFileTime
FileTimeToSystemTime
GetSystemTime
GetCurrentThreadId
SetCommState
GetCommState
SetCommTimeouts
GetCommTimeouts
ClearCommError
GetOverlappedResult
WaitCommEvent
PurgeComm
OutputDebugStringA
GetTempFileNameA
SuspendThread
GetCommandLineA
SetCurrentDirectoryA
MoveFileA
FileTimeToLocalFileTime
GetFileTime
GetDiskFreeSpaceExA
WritePrivateProfileStringA
WaitForSingleObject
SetCommMask
CreateEventA
Beep
GetComputerNameA
GetLogicalDrives
OpenProcess
GetCurrentThread
GetTimeZoneInformation
GetExitCodeProcess
QueryPerformanceFrequency
CopyFileA
SetEnvironmentVariableA
HeapAlloc
HeapFree
GetProcessHeap
GetCurrentProcessId
HeapSize
HeapSetInformation
GetStartupInfoW
HeapCreate
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
RaiseException
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetConsoleMode
LoadLibraryW
RtlUnwind
SetStdHandle
WriteConsoleW
CreateFileW
SetEndOfFile
FindResourceA
LoadResource
LockResource
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
SetErrorMode
GetVolumeInformationA
LoadLibraryA
GetProcAddress
FreeLibrary
GetFullPathNameA
RemoveDirectoryA
CreateDirectoryA
GetCurrentDirectoryA
ExpandEnvironmentStringsA
FindFirstFileA
FindClose
FindNextFileA
WideCharToMultiByte
DeleteFileA
GetFileSize
lstrlenA
WriteFile
MultiByteToWideChar
GetDateFormatA
GetUserDefaultLCID
GetVersion
GetFileAttributesA
GetModuleFileNameA
OpenMutexA
CreateMutexA
GetLastError
GetPrivateProfileStringA
CreateFileA
CloseHandle
SetFilePointer
ReadFile
GetModuleHandleA
ResumeThread
CreateThread
GetTickCount
GetLocalTime
Sleep
TerminateProcess
TerminateThread
ReleaseMutex
GetTempPathA
lstrcpyA
lstrcmpA
lstrcmpiA
lstrcpynA
lstrcatA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateProcessA
gdi32
LPtoDP
Ellipse
RoundRect
CreateSolidBrush
Rectangle
GetDIBits
CreateFontA
CreateCompatibleBitmap
StretchBlt
GetDeviceCaps
SetPixel
CreateCompatibleDC
CreateBitmap
GetPixel
SetBkColor
BitBlt
DeleteDC
GetTextMetricsA
SelectObject
SetBkMode
SetTextColor
CreatePen
MoveToEx
LineTo
GetStockObject
GetObjectA
CreateFontIndirectA
DeleteObject
user32
IsIconic
IsWindowVisible
SetFocus
BringWindowToTop
CheckDlgButton
SetWindowTextA
EndDialog
IsDlgButtonChecked
SetDlgItemTextA
GetDlgItemTextA
ScreenToClient
DialogBoxParamA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
DrawIconEx
CopyRect
FillRect
InflateRect
ChangeDisplaySettingsA
GetWindowTextLengthA
GetClassLongA
SetClassLongA
RegisterClassA
GetClassInfoA
CallNextHookEx
SetKeyboardState
keybd_event
GetDoubleClickTime
mouse_event
SetCursorPos
SendMessageTimeoutA
FindWindowA
SetActiveWindow
GetMenuStringA
GetMenuItemInfoA
GetSubMenu
GetMenu
IsMenu
VkKeyScanA
GetSystemMenu
PeekMessageA
GetFocus
GetDesktopWindow
GetWindowThreadProcessId
GetClassNameA
IsZoomed
EnableWindow
ShowCursor
GetWindowRect
WindowFromPoint
EnumChildWindows
GetClipboardData
IsClipboardFormatAvailable
GetNextDlgTabItem
EnumWindows
GetClassInfoExA
wvsprintfA
WaitForInputIdle
ExitWindowsEx
TranslateMessage
DispatchMessageA
GetMessageA
SetForegroundWindow
CreatePopupMenu
AppendMenuA
GetCursorPos
TrackPopupMenu
GetMenuItemCount
DestroyMenu
KillTimer
SetWindowsHookExA
GetForegroundWindow
GetWindowTextA
GetAsyncKeyState
GetTopWindow
SystemParametersInfoA
SetTimer
UnhookWindowsHookEx
DestroyWindow
PostQuitMessage
DefWindowProcA
MessageBoxA
IsWindow
ShowWindow
UpdateWindow
SendMessageA
wsprintfA
GetKeyState
MapVirtualKeyA
GetDC
GetClientRect
DrawFocusRect
ReleaseDC
SetWindowLongA
DestroyCursor
BeginPaint
DrawEdge
EndPaint
DrawTextA
SetCursor
GetParent
GetWindowLongA
InvalidateRect
CreateCursor
LoadIconA
GetSystemMetrics
LoadImageA
LoadCursorA
RegisterClassExA
SetRect
CreateWindowExA
GetWindow
GetDlgItem
SetWindowPos
GetSysColor
CallWindowProcA
PtInRect
IsWindowEnabled
LoadAcceleratorsA
PostMessageA
TranslateAcceleratorA
AttachThreadInput
IsDialogMessageA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
ControlService
StartServiceA
ChangeServiceConfigA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
GetUserNameA
RegEnumValueA
RegEnumKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryInfoKeyA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
comctl32
ImageList_Draw
ord17
InitCommonControlsEx
shell32
SHGetMalloc
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHFileOperationA
FindExecutableA
SHChangeNotify
ExtractIconExA
SHGetPathFromIDListA
ShellExecuteA
Shell_NotifyIconA
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
CLSIDFromProgID
OleInitialize
CreateStreamOnHGlobal
OleUninitialize
oleaut32
SafeArrayGetElement
VariantClear
SysAllocString
SafeArrayGetUBound
odbc32
ord2
ord10
ord31
ord9
ord43
ord13
ord54
ord24
ord6
ord18
ord11
ord45
ord7
ord50
ord1
ord57
wininet
InternetFindNextFileA
FtpDeleteFileA
FtpOpenFileA
FtpFindFirstFileA
InternetConnectA
FtpSetCurrentDirectoryA
FtpRemoveDirectoryA
FtpCreateDirectoryA
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetCheckConnectionA
InternetGetConnectedState
InternetWriteFile
ws2_32
select
inet_ntoa
recvfrom
sendto
setsockopt
WSASocketA
shutdown
WSACleanup
recv
WSAGetLastError
send
connect
htons
getservbyname
socket
gethostbyname
WSAStartup
closesocket
Sections
.text Size: 390KB - Virtual size: 389KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ