Static task
static1
Behavioral task
behavioral1
Sample
4efb93d28608343aae86e59157f1d08797b9332aa90330a44d33e0a678ff60ea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4efb93d28608343aae86e59157f1d08797b9332aa90330a44d33e0a678ff60ea.exe
Resource
win10v2004-20240226-en
General
-
Target
4efb93d28608343aae86e59157f1d08797b9332aa90330a44d33e0a678ff60ea
-
Size
3.2MB
-
MD5
aebc390b209aa94c5fb82767dba94918
-
SHA1
9d864ae70e8d4417760fbc57b42cb99b6c11d2bb
-
SHA256
4efb93d28608343aae86e59157f1d08797b9332aa90330a44d33e0a678ff60ea
-
SHA512
24f9f0c42a8974b62eefb41531c8663f8f72a5032b29ae657ce0e845e667d8fb9703a82e6d081d9465a5bffba0efcf3839a7d1ff29e9edb7c9959cd20e1627bc
-
SSDEEP
98304:qg5/ZuVx819F5s8guthvylWXOLGHdHHHHHHqUPh:x5/ZuVx81/yvutdylWXcGHwUp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4efb93d28608343aae86e59157f1d08797b9332aa90330a44d33e0a678ff60ea
Files
-
4efb93d28608343aae86e59157f1d08797b9332aa90330a44d33e0a678ff60ea.exe windows:4 windows x86 arch:x86
0b7e3217a57544f1e7a2187b81b325e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
HeapReAlloc
TerminateProcess
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
ExitThread
IsBadWritePtr
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
SetStdHandle
GetOEMCP
GetCPInfo
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
CreateFileA
GetDriveTypeA
CompareStringA
CompareStringW
SetEnvironmentVariableA
ExitProcess
RtlUnwind
GetStartupInfoW
GetTickCount
GetFileTime
GetFileAttributesW
SetErrorMode
GetCurrentDirectoryW
WritePrivateProfileStringW
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
CreateFileW
GetFullPathNameW
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
lstrcmpiW
CloseHandle
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
FreeResource
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetModuleHandleA
LoadLibraryA
lstrcatW
lstrcmpW
GetVersionExA
GetLastError
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetProcessHeap
HeapAlloc
HeapFree
GetWindowsDirectoryW
GetModuleHandleW
GetVolumeInformationW
CopyFileW
lstrcpynW
LoadLibraryW
GetProcAddress
FreeLibrary
FindFirstFileW
DeleteFileW
FindNextFileW
FindClose
RemoveDirectoryW
GetTempPathW
GetModuleFileNameW
lstrlenA
CreateDirectoryW
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
lstrcpyW
FindResourceW
LoadResource
LockResource
SetUnhandledExceptionFilter
SizeofResource
user32
InvalidateRgn
CopyAcceleratorTableW
SetRect
IsRectEmpty
GetSysColorBrush
CharUpperW
WindowFromPoint
SetWindowContextHelpId
MapDialogRect
GetMessageW
TranslateMessage
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetDC
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
CharNextW
SetMenuItemBitmaps
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapW
IsWindowEnabled
IsDialogMessageW
RegisterWindowMessageW
WinHelpW
GetCapture
CreateWindowExW
SetWindowsHookExW
CallNextHookEx
GetClassInfoExW
GetClassLongW
GetClassNameW
SetPropW
RemovePropW
SendDlgItemMessageW
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
EnableWindow
SetWindowLongW
GetWindowLongW
SendMessageW
SetWindowTextW
DrawIcon
AppendMenuW
GetSystemMenu
IsIconic
GetClientRect
GetParent
LoadIconW
GetSystemMetrics
GetKeyState
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
PostThreadMessageW
GetClassInfoW
RegisterClassW
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
RegisterClipboardFormatW
GetPropW
GetNextDlgGroupItem
GetWindowRect
UpdateWindow
InvalidateRect
GetWindow
MessageBoxW
MessageBeep
PostMessageW
SetTimer
KillTimer
SetWindowPos
wsprintfW
FindWindowW
RedrawWindow
IsWindowVisible
SetForegroundWindow
ShowWindow
MoveWindow
DestroyMenu
TrackPopupMenu
GetCursorPos
InsertMenuW
CreatePopupMenu
LoadImageW
IsWindow
SetCursor
PtInRect
SetCapture
ReleaseCapture
LoadCursorW
UnregisterClassW
ReleaseDC
gdi32
GetMapMode
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetRgnBox
SelectObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateRectRgnIndirect
ExtTextOutW
GetTextColor
GetBkColor
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateFontIndirectW
CreateCompatibleDC
GetObjectW
StretchBlt
DeleteObject
GetStockObject
GetViewportExtEx
comdlg32
GetSaveFileNameW
GetFileTitleW
GetOpenFileNameW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyW
RegDeleteKeyW
RegEnumKeyW
RegQueryValueW
RegSetValueExW
RegSetValueExA
shell32
SHBrowseForFolderW
SHGetMalloc
Shell_NotifyIconW
ShellExecuteW
SHGetPathFromIDListW
comctl32
ord17
ImageList_Destroy
shlwapi
PathRemoveFileSpecW
PathAppendW
PathAddBackslashW
PathIsDirectoryW
PathFileExistsW
StrStrIW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CLSIDFromProgID
CoUninitialize
CoGetClassObject
OleRun
CoCreateGuid
CoTaskMemFree
CLSIDFromString
CoInitialize
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
CoTaskMemAlloc
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoCreateInstance
OleInitialize
oleaut32
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysFreeString
VariantInit
VariantCopy
SysAllocStringLen
VariantChangeType
OleCreateFontIndirect
SysStringLen
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
GetErrorInfo
VariantClear
urlmon
URLDownloadToFileW
iphlpapi
GetPerAdapterInfo
GetAdaptersInfo
ws2_32
recv
connect
send
htons
gethostbyname
WSACleanup
socket
gethostname
WSAStartup
Sections
.text Size: 272KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ