Static task
static1
Behavioral task
behavioral1
Sample
71003d3693c00efabaf3d2f32d763088955ac9b2ebb5813477a68e2cf4368e7a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
71003d3693c00efabaf3d2f32d763088955ac9b2ebb5813477a68e2cf4368e7a.exe
Resource
win10v2004-20240226-en
General
-
Target
71003d3693c00efabaf3d2f32d763088955ac9b2ebb5813477a68e2cf4368e7a
-
Size
296KB
-
MD5
038f1ab83b09c6a1d01283558f751977
-
SHA1
f6661b442222a2cb657a7d5be4a4335cd1744673
-
SHA256
71003d3693c00efabaf3d2f32d763088955ac9b2ebb5813477a68e2cf4368e7a
-
SHA512
bb76042931bc11b523999ace20ab2e15e4bdf38edf823140fef4cd4254e3365bdc0453f76b4b895de52cbbdfd98a9369d64ba04d32cbce05121f8a0d0a67e0ef
-
SSDEEP
3072:lUlOGCcw4XUjLRrqFfobvk2cBItc2gR8aoKgiR+n00rJO9NJyG4s9y6hJUp693rb:qlqcHXUjLhlLtcbRiDxsn93roScs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71003d3693c00efabaf3d2f32d763088955ac9b2ebb5813477a68e2cf4368e7a
Files
-
71003d3693c00efabaf3d2f32d763088955ac9b2ebb5813477a68e2cf4368e7a.exe windows:4 windows x86 arch:x86
3b64a72c6bb654355cbc8ccd223ff304
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToSystemTime
FileTimeToLocalFileTime
SizeofResource
GetStartupInfoA
GetCommandLineA
ExitProcess
RtlUnwind
HeapAlloc
HeapFree
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetErrorMode
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
WritePrivateProfileStringA
GetProfileStringA
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
GetShortPathNameA
GetThreadLocale
GetStringTypeExA
GetVolumeInformationA
FindFirstFileA
FindClose
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetOEMCP
GetCPInfo
SetLastError
GetProcessVersion
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
MulDiv
GetModuleFileNameA
GlobalAlloc
lstrcmpA
LocalFree
GetLastError
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetFullPathNameA
GetTempFileNameA
GetFileAttributesA
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
CloseHandle
InterlockedDecrement
LoadLibraryA
FreeLibrary
FindResourceA
LoadResource
LockResource
GetCurrentThreadId
lstrcmpiA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
lstrcatA
lstrcpyA
lstrlenA
GlobalLock
lstrcpynA
GlobalUnlock
GlobalGetAtomNameA
GlobalAddAtomA
GetVersion
GetCurrentThread
SetThreadPriority
OpenProcess
WaitForSingleObject
GetMailslotInfo
ReadFile
CreateMailslotA
Sleep
GetEnvironmentVariableA
user32
IsDialogMessageA
SetWindowTextA
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
PostQuitMessage
ShowOwnedPopups
FindWindowA
GetClassNameA
PtInRect
ClientToScreen
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
LoadStringA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
CharUpperA
DestroyIcon
CreateDialogIndirectParamA
EndDialog
GetSysColor
DispatchMessageA
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
GetClientRect
BeginDeferWindowPos
EndDeferWindowPos
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
MessageBoxA
IsChild
RegisterClassA
GetWindowTextLengthA
DefWindowProcA
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetLastActivePopup
BringWindowToTop
IsWindowVisible
IsIconic
GetFocus
EqualRect
CopyRect
GetDlgItem
InvalidateRect
SetWindowLongA
wsprintfA
GetKeyState
SetWindowPos
GetDlgCtrlID
GetMenuItemCount
GetSubMenu
GetMenuItemID
UnpackDDElParam
ReuseDDElParam
SetActiveWindow
WinHelpA
GetMenu
GetClassInfoA
LoadMenuA
DestroyMenu
SetFocus
GetParent
GetActiveWindow
EnableWindow
SetMenu
LoadIconA
UpdateWindow
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
ShowWindow
GetWindowLongA
IsWindow
GetDesktopWindow
GetWindow
IsWindowEnabled
SendMessageA
SetCursor
PeekMessageA
PostMessageA
GetCapture
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
SendDlgItemMessageA
GetWindowTextA
MapWindowPoints
RegisterWindowMessageA
KillTimer
SetTimer
IsWindowUnicode
CharNextA
InflateRect
DefDlgProcA
DrawFocusRect
RemovePropA
gdi32
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetDeviceCaps
DeleteObject
LPtoDP
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateDIBitmap
PatBlt
GetTextExtentPointA
BitBlt
CreateCompatibleDC
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegSetValueA
RegCreateKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
SetFileSecurityA
RegOpenKeyA
RegCloseKey
RegQueryValueA
GetFileSecurityA
smell32
SHGetFileInfoA
DragQueryFileA
DragFinish
Shell_NotifyIconA
ExtractIconA
comctl32
ord17
Sections
.text Size: 132KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE