GetGlobalDataPointer
Static task
static1
Behavioral task
behavioral1
Sample
e0754cc76d7cfc1a2adef131f71f9a47d2fb66de3894b9ff194273c49683f058.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0754cc76d7cfc1a2adef131f71f9a47d2fb66de3894b9ff194273c49683f058.exe
Resource
win10v2004-20240226-en
General
-
Target
e0754cc76d7cfc1a2adef131f71f9a47d2fb66de3894b9ff194273c49683f058
-
Size
1.2MB
-
MD5
8b7683555bb9612f81b64eaac823584b
-
SHA1
392159dc8a239e00f443113f3e1b0d070de517bc
-
SHA256
e0754cc76d7cfc1a2adef131f71f9a47d2fb66de3894b9ff194273c49683f058
-
SHA512
3c9335d78e00133dbfc4bd886c9957d169c1a6af7fc817de6ea72cb591e9b029cea68cb54846db9d9a9c5b0286a7ad6b9245038aa6ad84baceb2dd5ee9550777
-
SSDEEP
12288:VcYzRDRnPY6Le+AuY0DdIILwqLtxUlwHj4KubIoIgP:VcYl3Le+AULxtGlcJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0754cc76d7cfc1a2adef131f71f9a47d2fb66de3894b9ff194273c49683f058
Files
-
e0754cc76d7cfc1a2adef131f71f9a47d2fb66de3894b9ff194273c49683f058.exe windows:5 windows x86 arch:x86
10e2a4d9cc40e0d84555a8a6f5d2357f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
SetErrorMode
FileTimeToLocalFileTime
GetFileSizeEx
GetFileTime
RtlUnwind
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitThread
CreateThread
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
LockFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
SetFilePointer
ReadFile
WritePrivateProfileStringA
FileTimeToSystemTime
GetThreadLocale
GetModuleHandleW
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
SuspendThread
SetEvent
SetThreadPriority
GetCurrentProcessId
InterlockedDecrement
GetModuleFileNameW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
SetLastError
MultiByteToWideChar
lstrcmpW
GetVersionExA
MulDiv
GetAtomNameA
LoadLibraryA
FreeLibrary
OutputDebugStringA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
CreateMutexA
GetLastError
CreateEventA
CopyFileA
OpenEventA
ExitProcess
GetModuleHandleA
GetProcAddress
GetCurrentProcess
GetCurrentThreadId
GetTempFileNameA
GetModuleFileNameA
CreateProcessA
GetExitCodeProcess
WinExec
Sleep
WaitForSingleObject
GetFileAttributesA
FindFirstFileA
FindNextFileA
DeleteFileA
FindClose
RemoveDirectoryA
GetTempPathA
CreateFileA
WriteFile
GetShortPathNameA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
CloseHandle
TerminateProcess
GetLogicalDriveStringsA
lstrcmpiA
QueryDosDeviceA
lstrcpyA
lstrcatA
GetLocalTime
GetTickCount
ResumeThread
IsValidCodePage
lstrlenA
user32
GetSysColorBrush
UnregisterClassA
CharUpperA
CharNextA
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
TranslateMessage
ValidateRect
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
EndPaint
BeginPaint
GetMenuState
GetMenuStringA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
SetMenu
IsWindowVisible
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
LoadCursorA
DefWindowProcA
TrackPopupMenuEx
SetForegroundWindow
GetWindow
GetSubMenu
GetMenuItemID
SetWindowsHookExA
SetWindowLongA
GetMenu
CallNextHookEx
CallWindowProcA
GetMenuItemCount
GetMenuItemInfoA
UnhookWindowsHookEx
CopyRect
InflateRect
OffsetRect
GetCursorPos
KillTimer
ScreenToClient
AdjustWindowRect
SetWindowRgn
IsZoomed
PtInRect
ReleaseDC
GetWindowDC
SetRect
UpdateWindow
GetDC
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
IsRectEmpty
DestroyMenu
SetWindowContextHelpId
MapDialogRect
GetDlgItem
FillRect
FrameRect
SendMessageA
GetWindowRect
GetClientRect
ClientToScreen
InvalidateRect
RedrawWindow
GetActiveWindow
GetCapture
SetCapture
GetParent
EnableWindow
GetWindowLongA
LoadImageA
ReleaseCapture
SetCursor
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetSysColor
PostMessageA
PostThreadMessageA
DestroyIcon
LoadBitmapA
GetFocus
LoadIconA
GetKeyState
GetSystemMetrics
DrawIconEx
IsWindow
GetMessageA
PostQuitMessage
GetInputState
GetForegroundWindow
gdi32
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
ScaleViewportExtEx
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
SelectClipRgn
CreateCompatibleBitmap
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateFontA
Rectangle
CombineRgn
CreateRectRgn
GetStockObject
StretchBlt
GetObjectA
CreateBitmap
DeleteObject
CreateSolidBrush
CreatePen
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
BitBlt
SelectObject
CreateCompatibleDC
MoveToEx
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegQueryInfoKeyA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
SHFileOperationA
ShellExecuteA
ShellExecuteExA
SHChangeNotify
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
CoRevokeClassObject
CoFreeUnusedLibraries
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
OleIsCurrentClipboard
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
OleUninitialize
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromProgID
oleaut32
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
VariantClear
psapi
GetProcessImageFileNameA
Exports
Exports
Sections
.text Size: 248KB - Virtual size: 247KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Dwinuar Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 849KB - Virtual size: 849KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ