Static task
static1
Behavioral task
behavioral1
Sample
acfbb9c4d4860200b7b2a7d6a628a3711e4eab12e2142e2ed8d206cc10e1713d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acfbb9c4d4860200b7b2a7d6a628a3711e4eab12e2142e2ed8d206cc10e1713d.exe
Resource
win10v2004-20240226-en
General
-
Target
acfbb9c4d4860200b7b2a7d6a628a3711e4eab12e2142e2ed8d206cc10e1713d
-
Size
1.4MB
-
MD5
2548af23be93b63cb39c461c54b29104
-
SHA1
f9df52f915758b54c83a9323abbb5be4d6b8fb45
-
SHA256
acfbb9c4d4860200b7b2a7d6a628a3711e4eab12e2142e2ed8d206cc10e1713d
-
SHA512
7fe2b949586c9347b67175ee9eecb4ca8d3f8358bef7abdb260358741d9baf0883364108fad7cb1ae0633f7f05315937be6560d083d0802a48dfedcd8b6dbcad
-
SSDEEP
24576:/NcRjbcdGzLZG3KapCc1lzFRE605BGFSza5JUKnO5xTT:/NcRjbHUQ8+jBq95JUcO5xT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource acfbb9c4d4860200b7b2a7d6a628a3711e4eab12e2142e2ed8d206cc10e1713d
Files
-
acfbb9c4d4860200b7b2a7d6a628a3711e4eab12e2142e2ed8d206cc10e1713d.exe windows:4 windows x86 arch:x86
7d0e27465b7800f9913307da5603168e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetEnvironmentStrings
GetCommandLineW
GetCommandLineA
SetHandleCount
GetStdHandle
GetStartupInfoA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
CompareStringA
CompareStringW
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetCurrentDirectoryA
UnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
SetEnvironmentVariableA
GetDriveTypeA
GetLocaleInfoW
HeapSize
GetFileType
FindResourceA
GlobalAddAtomA
GetProfileStringA
InterlockedExchange
SetStdHandle
GetLocalTime
GetSystemTime
GetTimeZoneInformation
ExitThread
CreateThread
HeapReAlloc
GetDriveTypeW
RaiseException
HeapFree
HeapAlloc
RtlUnwind
GetStartupInfoW
SetErrorMode
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
FindResourceExW
GetCurrentDirectoryW
GlobalFlags
FindNextFileW
lstrcmpiW
GetThreadLocale
GetStringTypeExW
GetVolumeInformationW
FindFirstFileW
FindClose
UnlockFile
LockFile
SetFilePointer
DuplicateHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
GetProfileIntW
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetProcessVersion
GlobalGetAtomNameW
MulDiv
SetLastError
GetDiskFreeSpaceW
GetFileTime
SetFileTime
GetFullPathNameW
GetTempFileNameW
GetFileAttributesW
GlobalFree
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
LoadLibraryA
GetVersion
lstrcatW
GlobalAddAtomW
GlobalFindAtomW
SuspendThread
lstrcmpW
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
lstrlenA
ExitProcess
SizeofResource
LoadResource
LockResource
GlobalAlloc
GlobalLock
GlobalUnlock
SetCurrentDirectoryW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
FindResourceW
FlushFileBuffers
WriteFile
ReadFile
SetFilePointerEx
SetEndOfFile
GetFileSizeEx
CreateFileW
MultiByteToWideChar
GetWindowsDirectoryW
GetModuleFileNameW
LeaveCriticalSection
WideCharToMultiByte
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryW
FreeLibrary
GetCurrentProcess
GetTempPathW
CreateDirectoryW
GetFileAttributesExW
GetLongPathNameW
GetShortPathNameW
GetLastError
LocalFree
MoveFileW
DeleteFileW
SetThreadPriority
SetEvent
CloseHandle
CreateEventW
Sleep
CreateProcessW
TerminateProcess
GetExitCodeProcess
GetCurrentThreadId
GetModuleHandleW
GetProcAddress
GetVersionExW
lstrcpynW
lstrcpyW
WaitForSingleObject
ResumeThread
GetTickCount
lstrlenW
user32
SendDlgItemMessageW
SendDlgItemMessageA
MapWindowPoints
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetTopWindow
IsChild
WinHelpW
wsprintfW
GetClassInfoW
RegisterClassW
TrackPopupMenu
SetWindowPlacement
GetDlgItem
GetWindowTextLengthW
GetWindowTextW
GetDlgCtrlID
DestroyWindow
CreateWindowExW
DefWindowProcW
GetMessageTime
GetForegroundWindow
GetWindowPlacement
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuW
SetMenuItemBitmaps
EnableMenuItem
GetNextDlgTabItem
GetActiveWindow
ValidateRect
GetLastActivePopup
MessageBoxW
ShowOwnedPopups
PostQuitMessage
LockWindowUpdate
CheckMenuItem
SetWindowPos
GetMenu
SetMenu
IsIconic
FindWindowW
ExitWindowsEx
DestroyIcon
GetMessageW
MsgWaitForMultipleObjects
PeekMessageW
TranslateMessage
DispatchMessageW
InsertMenuW
GetMenuStringW
CallNextHookEx
keybd_event
SetWindowsHookExW
TrackPopupMenuEx
UnhookWindowsHookEx
GetMenuItemCount
WindowFromPoint
SetRect
GetCapture
DrawFocusRect
GetDC
ReleaseDC
SetCursor
IntersectRect
IsRectEmpty
GetSysColor
SetRectEmpty
IsWindowEnabled
SetFocus
RegisterWindowMessageW
GetWindow
CreatePopupMenu
GetMessagePos
RedrawWindow
PostMessageW
UpdateWindow
UnregisterClassW
SystemParametersInfoW
GetWindowTextLengthA
HideCaret
ShowCaret
ExcludeUpdateRgn
BeginDeferWindowPos
OffsetRect
EndDeferWindowPos
GetSystemMenu
RemovePropW
GetPropW
CallWindowProcW
SetPropW
SetWindowLongW
GetMenuItemID
GetMenuDefaultItem
LoadIconW
KillTimer
SetTimer
SetParent
InflateRect
SetMenuDefaultItem
CheckMenuRadioItem
GetWindowRect
GetClassNameW
CharUpperW
GetDCEx
GetSysColorBrush
wvsprintfW
LoadStringW
BringWindowToTop
UnpackDDElParam
ReuseDDElParam
GetCursorPos
GetKeyState
DeleteMenu
GetParent
GrayStringW
DrawTextW
TabbedTextOutW
ScreenToClient
InvalidateRect
GetFocus
SetCapture
ReleaseCapture
PtInRect
LoadMenuW
IsWindowVisible
ClientToScreen
GetSubMenu
SetActiveWindow
SetForegroundWindow
SendMessageW
EnableWindow
GetClientRect
CopyRect
GetSystemMetrics
GetWindowLongW
GetWindowTextA
DrawTextA
GetClassInfoA
DefDlgProcA
DefWindowProcA
GetDesktopWindow
TranslateAcceleratorW
LoadAcceleratorsW
EndPaint
BeginPaint
GetWindowDC
EndDialog
CreateDialogIndirectParamW
MapDialogRect
GetAsyncKeyState
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
IsDlgButtonChecked
DestroyMenu
SetDlgItemTextW
CharNextA
CallWindowProcA
RemovePropA
SetWindowsHookExA
GetWindowLongA
SendMessageA
IsWindowUnicode
GetClassNameA
SetWindowLongA
SetPropA
GetPropA
LoadCursorW
DestroyCursor
IsWindow
LoadBitmapW
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
IntersectClipRect
GetDeviceCaps
CreatePen
CreateSolidBrush
CreatePatternBrush
SetRectRgn
GetTextMetricsW
EnumFontFamiliesExW
CreateRectRgn
CombineRgn
SetTextColor
SetBkMode
CreateBitmap
SetBkColor
SaveDC
GetClipBox
CreateRectRgnIndirect
ExtSelectClipRgn
SetStretchBltMode
StretchDIBits
SetDIBitsToDevice
RestoreDC
CreateDIBSection
DeleteDC
PatBlt
DeleteObject
SelectObject
GetBkMode
GetBkColor
GetTextExtentPoint32W
GetTextColor
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
GetStockObject
GetObjectW
CreateDIBitmap
ExtTextOutA
GetTextExtentPointA
CreateFontIndirectW
comdlg32
GetFileTitleW
GetOpenFileNameW
GetSaveFileNameW
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegCloseKey
RegQueryValueW
RegSetValueExW
RegCreateKeyW
RegSetValueW
RegDeleteKeyW
RegEnumKeyW
RegOpenKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegDeleteValueW
SetFileSecurityW
GetFileSecurityW
RegEnumKeyExW
shell32
SHGetDesktopFolder
SHGetMalloc
SHGetFileInfoW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
DragQueryFileW
SHFileOperationW
SHGetSpecialFolderPathW
DragAcceptFiles
DragFinish
ShellExecuteW
ExtractIconW
comctl32
ImageList_GetImageInfo
ImageList_ReplaceIcon
ImageList_BeginDrag
_TrackMouseEvent
ImageList_AddMasked
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_EndDrag
ord17
PropertySheetW
DestroyPropertySheetPage
CreatePropertySheetPageW
ImageList_Destroy
ImageList_Create
ImageList_DrawIndirect
ImageList_Draw
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CoCreateGuid
oleaut32
SysAllocString
SysFreeString
shlwapi
PathFileExistsW
PathFindExtensionW
PathMakePrettyW
PathFindFileNameW
PathRemoveFileSpecW
PathRenameExtensionW
PathIsRootW
PathIsDirectoryW
PathIsURLW
winhttp
WinHttpQueryHeaders
WinHttpCrackUrl
WinHttpReadData
WinHttpCloseHandle
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpQueryOption
WinHttpSetOption
WinHttpReceiveResponse
Sections
.text Size: 812KB - Virtual size: 811KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 416KB - Virtual size: 414KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ