Static task
static1
Behavioral task
behavioral1
Sample
ba81847881283265fc843b83a82c03ae.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba81847881283265fc843b83a82c03ae.exe
Resource
win10v2004-20240226-en
General
-
Target
ba81847881283265fc843b83a82c03ae
-
Size
309KB
-
MD5
ba81847881283265fc843b83a82c03ae
-
SHA1
242039cc62e1d86cab2ae9f63eabb266b851b801
-
SHA256
6f7fbfd47c232cecb58ef9fff423fa1772fa1b8cf047ef39314978777ff9208f
-
SHA512
0df03424b57cafdd1552ba406e3947e95d304d72fab22b8fbed92e9593facc18f396df88751a78c67b519337692331a61e40f6ca2eb1c63cc04d4787fa5f14c6
-
SSDEEP
6144:UKF8Z2RAp3NZK+1T6TXKAWDTwXij0JOIBB7:U+8dpdZKpTQH0X9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba81847881283265fc843b83a82c03ae
Files
-
ba81847881283265fc843b83a82c03ae.exe windows:4 windows x86 arch:x86
5349b8ca7947095512a07252d297a3c4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadBitmapA
SetFocus
DestroyIcon
PeekMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
LoadCursorA
CopyIcon
GetDC
ReleaseDC
InflateRect
GetSysColor
InvalidateRect
IsWindow
SetWindowLongA
SetCursor
PtInRect
ReleaseCapture
SetCapture
PostMessageA
MessageBeep
GetParent
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
CharNextA
IsWindowUnicode
ExitWindowsEx
LoadImageA
RedrawWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
LoadIconA
EnableWindow
SendMessageA
GetWindowRect
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
RegisterWindowMessageA
SetWindowPos
GetWindowLongA
GetWindow
SetForegroundWindow
GetForegroundWindow
GetLastActivePopup
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetKeyState
GetDlgCtrlID
GetWindowTextA
GetWindowTextLengthA
GetDlgItem
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
RegisterClassA
GetClassInfoA
wsprintfA
WinHelpA
GetCapture
GetTopWindow
IsWindowVisible
CopyRect
ScreenToClient
AdjustWindowRectEx
SetActiveWindow
GetFocus
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
CheckDlgButton
CheckRadioButton
SetDlgItemTextA
IsDlgButtonChecked
IsDialogMessageA
SetWindowTextA
MoveWindow
ShowWindow
IsWindowEnabled
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
PostQuitMessage
GetCursorPos
ValidateRect
GetActiveWindow
GetMessageA
CreateDialogIndirectParamA
EndDialog
wvsprintfA
LoadStringA
DestroyMenu
GetAsyncKeyState
MapDialogRect
WindowFromPoint
GetClassNameA
GetSysColorBrush
UnregisterClassA
ws2_32
socket
closesocket
recv
WSAGetLastError
gethostname
WSACleanup
ioctlsocket
htons
WSAStartup
inet_addr
gethostbyaddr
gethostbyname
connect
send
kernel32
lstrcpynA
ReadFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
IsBadWritePtr
IsBadReadPtr
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GetProcessVersion
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
SizeofResource
SetErrorMode
RtlUnwind
HeapReAlloc
HeapAlloc
HeapSize
HeapFree
RaiseException
GetSystemTime
GetLocalTime
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
GetACP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetHandleCount
GetStdHandle
GetFileType
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
LocalFree
GlobalFree
GlobalAlloc
GetCurrentThread
GlobalLock
GlobalUnlock
MulDiv
SetLastError
FindResourceA
LoadResource
LockResource
GetVersion
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
GetVersionExA
lstrcmpA
GetExitCodeThread
DeleteFileA
GetProfileStringA
GetSystemDirectoryA
SetEvent
CopyFileA
WaitForSingleObject
GetTempPathA
CreateThread
CreateProcessA
lstrcatA
lstrlenA
WinExec
lstrcpyA
GetWindowsDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
GetTickCount
GetFileAttributesA
CreateFileA
Sleep
GetFileSize
WriteFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
CreateEventA
OpenEventA
GetLastError
FormatMessageA
GetCurrentProcess
CloseHandle
GetTimeZoneInformation
gdi32
CreateDIBitmap
CreateCompatibleDC
BitBlt
GetTextExtentPointA
PatBlt
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
IntersectClipRect
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetBitmapDimensionEx
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
GetStockObject
CreateSolidBrush
DeleteObject
comdlg32
GetSaveFileNameA
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegEnumValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegDeleteValueA
RegSetValueExA
AdjustTokenPrivileges
RegQueryValueExA
shell32
ExtractIconA
ShellExecuteExA
ShellExecuteA
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
comctl32
ord17
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Destroy
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ