Static task
static1
Behavioral task
behavioral1
Sample
b874aaa5699701b937b16058161fcb9a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b874aaa5699701b937b16058161fcb9a.exe
Resource
win10v2004-20240226-en
General
-
Target
b874aaa5699701b937b16058161fcb9a
-
Size
544KB
-
MD5
b874aaa5699701b937b16058161fcb9a
-
SHA1
168188a27aa6eb43d942c25da3313190a3bad476
-
SHA256
cb09e78e4883c0cc2285792d04d7d7536d5173a830bc1ee4ac5bd6839a900ee4
-
SHA512
ac9dce9e437cafb16cacf3a0ad8eda271c261a8c8bbbca5f5744b7e0b0d65e7c8f7c4335edb0d88fd5dbd903bbf303c7780c743cf7977b2091fbeccc30bac39e
-
SSDEEP
12288:Oz5A/ANKNmq7sM/u6q6BLM5/5UThj2GNXPJTz/SHDzt:Oz5eAN81TzLM5eThj2KJzSHDzt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b874aaa5699701b937b16058161fcb9a
Files
-
b874aaa5699701b937b16058161fcb9a.exe windows:4 windows x86 arch:x86
00b4fbbd700534fcf2540ae90427b386
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetDlgItemTextW
BringWindowToTop
RegisterClassA
TileChildWindows
SetRect
GetAncestor
CharToOemBuffW
RegisterClassExA
SetWindowWord
GetDlgItemTextW
IsDialogMessage
DdeUnaccessData
GetGuiResources
CallWindowProcW
CreateMenu
DdeQueryStringW
GetClipboardFormatNameA
IsCharAlphaW
CreateDialogIndirectParamW
GetDCEx
DdeGetData
LoadCursorA
RegisterClassW
advapi32
RegOpenKeyExA
RegConnectRegistryW
gdi32
LPtoDP
SetTextAlign
GetSystemPaletteEntries
Rectangle
GetViewportOrgEx
TextOutA
OffsetWindowOrgEx
SelectObject
GetCurrentPositionEx
GetMetaFileBitsEx
PolyBezierTo
Arc
SetPaletteEntries
GetNearestPaletteIndex
PolyPolyline
ExtCreateRegion
kernel32
HeapFree
GetStringTypeA
GetACP
OpenMutexA
CreateMutexA
SetLastError
LoadLibraryW
VirtualFreeEx
GetConsoleOutputCP
WriteConsoleA
HeapDestroy
RtlUnwind
GetEnvironmentStringsW
GetWindowsDirectoryW
WriteFile
WriteConsoleW
IsValidCodePage
VirtualQuery
FreeLibrary
FreeEnvironmentStringsA
SetHandleCount
TlsFree
TlsGetValue
FreeEnvironmentStringsW
FlushConsoleInputBuffer
GlobalDeleteAtom
GetCurrentProcessId
ExitProcess
VirtualAllocEx
GetSystemTimeAsFileTime
GetNamedPipeHandleStateA
SetUnhandledExceptionFilter
IsDebuggerPresent
InterlockedDecrement
GetLocaleInfoW
VirtualAlloc
GetStartupInfoA
WriteConsoleInputA
GetModuleFileNameA
GetConsoleCP
GetCurrentDirectoryA
GetLocaleInfoA
LCMapStringW
VirtualQueryEx
GetModuleHandleA
GetProcAddress
LoadLibraryA
LeaveCriticalSection
GetConsoleMode
lstrcpynA
TlsSetValue
MultiByteToWideChar
InterlockedIncrement
CompareStringW
GetTickCount
GetLastError
ReadConsoleOutputCharacterW
GetTimeZoneInformation
SetThreadIdealProcessor
GetConsoleCursorInfo
InterlockedExchange
GetTimeFormatA
HeapSize
SetConsoleCtrlHandler
GetProcessHeap
GetCurrentThreadId
GetCurrentProcess
SystemTimeToTzSpecificLocalTime
GetCommandLineA
HeapReAlloc
GetEnvironmentStrings
CompareStringA
GetFileType
GetStartupInfoW
VirtualFree
WideCharToMultiByte
CloseHandle
GetModuleFileNameW
GetCommandLineW
ReadFile
OpenFile
GetStringTypeW
TlsAlloc
TerminateThread
SetEnvironmentVariableA
GetExitCodeThread
GetCurrentThread
EnumSystemLocalesA
CreateFileA
EnterCriticalSection
GetDateFormatA
Sleep
TerminateProcess
InitializeCriticalSection
GetStdHandle
HeapAlloc
CreateRemoteThread
HeapCreate
GetOEMCP
LCMapStringA
SetStdHandle
UnhandledExceptionFilter
GetVersionExA
WaitForSingleObject
IsValidLocale
QueryPerformanceCounter
GetUserDefaultLCID
GetCPInfo
DeleteCriticalSection
FlushFileBuffers
lstrcmpiW
SetFilePointer
comdlg32
GetSaveFileNameA
comctl32
InitCommonControlsEx
shell32
SHGetPathFromIDListA
SHGetMalloc
RealShellExecuteExA
FindExecutableA
Sections
.text Size: 206KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 314KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ