Static task
static1
Behavioral task
behavioral1
Sample
be42acf963616b6c9561f94c8c9b9669.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be42acf963616b6c9561f94c8c9b9669.exe
Resource
win10v2004-20240226-en
General
-
Target
be42acf963616b6c9561f94c8c9b9669
-
Size
277KB
-
MD5
be42acf963616b6c9561f94c8c9b9669
-
SHA1
347374a273a96fcfdaaf52f5465b45a774e0450f
-
SHA256
99cfd60d399b1842d2e51ee99e61a54823eec0f51443c56a19eb05a4c759e686
-
SHA512
840395804b05218fd677a6599cc1b43fc0b3cfd33073178bba04d970ba39e8a1b4f74764c4e8d4cea8377e7d45e736d72579abc950297289c0f8a37053aa1ea6
-
SSDEEP
6144:kvoA+p/uEY7MolHpDtefLurUUEd7XLaupA+Uue/SPjXP:kvoAtkol96Lu3+LalFx/w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be42acf963616b6c9561f94c8c9b9669
Files
-
be42acf963616b6c9561f94c8c9b9669.exe windows:4 windows x86 arch:x86
10bd24d56a21430783f276cc0ce15d43
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
TrackPopupMenu
GetClassInfoExW
EnumThreadWindows
GetWindowTextLengthW
CopyRect
GetWindowTextA
PostQuitMessage
SetDlgItemTextW
IsRectEmpty
CheckRadioButton
SendMessageA
BeginPaint
ReleaseDC
InflateRect
IsIconic
ShowWindow
EndPaint
DrawIconEx
DestroyMenu
RegisterClassExW
SendDlgItemMessageA
IsWindow
OffsetRect
GetWindowRect
GetWindow
CallWindowProcA
SetPropA
GetWindowLongW
PeekMessageA
SetWindowPos
CheckMenuItem
kernel32
OpenEventW
GetFileType
FreeLibrary
GetTimeFormatA
HeapCreate
lstrcmpA
IsDebuggerPresent
DisableThreadLibraryCalls
VirtualProtect
TlsFree
GetStringTypeW
GetStartupInfoA
InterlockedExchange
GetOEMCP
QueryPerformanceCounter
GetDateFormatA
SetStdHandle
ExitProcess
GetModuleFileNameA
GetComputerNameW
GlobalHandle
GetModuleHandleA
SystemTimeToFileTime
LeaveCriticalSection
SetConsoleCP
WriteConsoleW
GetStdHandle
VirtualAlloc
LoadLibraryA
FlushFileBuffers
TlsSetValue
lstrcpynW
InterlockedDecrement
InterlockedCompareExchange
GetWindowsDirectoryA
GetShortPathNameW
EnterCriticalSection
WaitForSingleObject
GetCurrentProcess
lstrcpyW
HeapFree
VirtualQuery
HeapAlloc
OutputDebugStringW
UnhandledExceptionFilter
WideCharToMultiByte
GetTickCount
RaiseException
ExpandEnvironmentStringsW
LoadResource
InitializeCriticalSection
GetFullPathNameA
GetSystemDirectoryA
GetProcAddress
GetDriveTypeW
GetCommandLineA
GetFileAttributesA
GetACP
GetVersion
GetConsoleCP
lstrlenA
GetCurrentThreadId
GetSystemDefaultLCID
CopyFileA
CreateDirectoryW
MultiByteToWideChar
GetSystemInfo
LocalFree
GlobalLock
TerminateProcess
GetVersionExA
gdi32
SetWindowOrgEx
LPtoDP
ExtTextOutW
SelectObject
CreateFontIndirectA
IntersectClipRect
SaveDC
PatBlt
DeleteObject
CreateDIBSection
BitBlt
GetDeviceCaps
advapi32
RegOpenKeyW
RegQueryValueExA
RegCreateKeyExW
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegCloseKey
RegOpenKeyExW
RegEnumKeyExW
RegOpenKeyExA
msvcrt
_vsnwprintf
_XcptFilter
_errno
strncmp
memmove
__getmainargs
??0exception@@QAE@ABV0@@Z
malloc
_initterm
wcstoul
_purecall
ole32
CoUninitialize
StringFromGUID2
CLSIDFromString
rpcrt4
RpcStringFreeW
version
GetFileVersionInfoW
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 223KB - Virtual size: 760KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ