k:\ceg\zcdfpemvva\
Static task
static1
Behavioral task
behavioral1
Sample
b51652310a0b32754bbe0ad6ccd3a005.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b51652310a0b32754bbe0ad6ccd3a005.exe
Resource
win10v2004-20240226-en
General
-
Target
b51652310a0b32754bbe0ad6ccd3a005
-
Size
556KB
-
MD5
b51652310a0b32754bbe0ad6ccd3a005
-
SHA1
827fec36aee795c91d8b4df69271f846af7579d4
-
SHA256
2474cbc234bb11123f1f8e92ad9189e49f6fd365e5368e2a748db36d99e07f16
-
SHA512
8f245e87de9a0db7ccbeb78ff49ff753167310f1c6fbdd9781598f1aa534b59552b38a14be32739906f0fbc678f13fa8b563b1cd809327166b2f78eb0a78aa7e
-
SSDEEP
12288:k6tXV9gHcxWjJGb6BXFBoor3u1lEcVJ2bCtL1xY3NIkI3y7SH:k6tFyHcGrooiHJ22GmyGH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b51652310a0b32754bbe0ad6ccd3a005
Files
-
b51652310a0b32754bbe0ad6ccd3a005.exe windows:4 windows x86 arch:x86
3bb23741bbdc1ca8cc85a209278430c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetGetCookieW
RetrieveUrlCacheEntryFileW
FtpRemoveDirectoryA
FindFirstUrlCacheEntryA
InternetGoOnlineA
InternetReadFileExW
advapi32
LogonUserW
InitializeSecurityDescriptor
RegRestoreKeyW
InitiateSystemShutdownA
CryptGetUserKey
RegEnumKeyW
RegOpenKeyExW
GetUserNameW
comctl32
ImageList_GetImageInfo
InitCommonControlsEx
user32
DrawTextExA
SetDlgItemTextW
SetClassLongW
FlashWindow
CharLowerBuffW
OpenWindowStationA
LoadImageW
CreateMDIWindowA
SystemParametersInfoA
ArrangeIconicWindows
CharUpperBuffA
LoadCursorW
OemToCharA
SetPropW
SetSystemCursor
DdeAddData
DestroyWindow
DrawStateA
MonitorFromWindow
LookupIconIdFromDirectory
GetClipboardFormatNameA
GetClipCursor
SetDlgItemTextA
GetListBoxInfo
RegisterClassExW
SubtractRect
SetPropA
CharNextExA
GetMenuItemRect
DrawIconEx
IsCharUpperA
CharPrevExA
TrackMouseEvent
ShowWindow
CreateAcceleratorTableW
GetMonitorInfoA
RedrawWindow
CreateWindowStationA
SendDlgItemMessageA
DefWindowProcW
DefFrameProcA
RegisterClassExA
GetCaretPos
RegisterDeviceNotificationA
LoadMenuA
GetGUIThreadInfo
LoadStringA
DestroyIcon
GetUpdateRect
DestroyCursor
EnumWindows
DialogBoxIndirectParamW
CreateIconFromResourceEx
DestroyCaret
FindWindowA
CreateWindowExW
RegisterClassA
CharUpperBuffW
CreateDesktopW
ChangeDisplaySettingsExW
IsCharAlphaA
DdeClientTransaction
GetMessageA
AdjustWindowRect
CharPrevW
GetActiveWindow
DdeInitializeW
DdeUnaccessData
MessageBoxW
CallWindowProcW
SetWindowsHookExW
CountClipboardFormats
AppendMenuA
GetClipboardSequenceNumber
ImpersonateDdeClientWindow
TabbedTextOutW
SetWindowContextHelpId
LoadIconA
ScreenToClient
GetMenuStringA
SetCaretPos
DefDlgProcW
SendNotifyMessageW
SystemParametersInfoW
EnumDisplaySettingsW
GetKeyNameTextA
EndMenu
RemovePropW
ValidateRect
SetWindowTextW
GetOpenClipboardWindow
CreateMDIWindowW
GetDlgItemTextA
CreateDialogIndirectParamW
SetClassWord
EnableMenuItem
DeferWindowPos
DdeReconnect
BroadcastSystemMessageA
PeekMessageA
SetUserObjectSecurity
DefWindowProcA
gdi32
GetObjectW
SelectClipPath
GetCharacterPlacementW
PlayEnhMetaFileRecord
CloseMetaFile
GetDeviceCaps
DeviceCapabilitiesExA
EnableEUDC
DeleteDC
DPtoLP
GdiPlayJournal
SetMagicColors
CreateDCA
OffsetViewportOrgEx
GetMiterLimit
SetStretchBltMode
UnrealizeObject
GetDIBColorTable
EnumFontsW
CreateDIBPatternBrushPt
CreateRectRgn
SetLayout
GetEnhMetaFileDescriptionW
SetICMProfileW
CreateHalftonePalette
kernel32
InterlockedDecrement
GetConsoleMode
VirtualQuery
RtlUnwind
LocalReAlloc
SetLastError
GetProfileStringA
GetProcessHeap
GetCurrentProcess
GetLocaleInfoW
GetDateFormatA
TlsSetValue
InterlockedExchange
WriteProfileSectionA
IsValidLocale
DeleteFiber
InitializeCriticalSection
GetStdHandle
HeapDestroy
InterlockedIncrement
IsDebuggerPresent
LoadLibraryA
ReadFile
EnumSystemLocalesA
GetOEMCP
GetLocaleInfoA
UnhandledExceptionFilter
HeapReAlloc
GetTimeZoneInformation
LCMapStringA
WriteFile
VirtualAlloc
TerminateProcess
HeapCreate
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCurrentThread
CompareStringA
LeaveCriticalSection
WriteConsoleA
GetTimeFormatA
GetEnvironmentStringsW
HeapFree
DeleteCriticalSection
EnterCriticalSection
SetConsoleCtrlHandler
SetHandleCount
CompareStringW
OpenMutexA
SetEnvironmentVariableA
IsValidCodePage
GetStringTypeA
GetLastError
ExitProcess
GetModuleFileNameA
SetLocaleInfoW
GetProcAddress
GetConsoleOutputCP
TlsAlloc
TlsFree
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
LCMapStringW
SetFilePointer
GetACP
FlushFileBuffers
GetModuleHandleA
GetCommandLineA
CreateFileA
FreeLibrary
SetStdHandle
GetCurrentThreadId
VirtualFree
GetCurrentProcessId
WriteConsoleW
GetEnvironmentStrings
GetVersionExA
GetCPInfo
GetTickCount
GetConsoleCP
TlsGetValue
Sleep
MultiByteToWideChar
GetStartupInfoA
GetFileType
WideCharToMultiByte
GetStringTypeW
CloseHandle
HeapAlloc
CreateMutexA
GetUserDefaultLCID
HeapSize
comdlg32
ChooseColorA
GetOpenFileNameW
GetSaveFileNameA
Sections
.text Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 249KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ