Static task
static1
Behavioral task
behavioral1
Sample
d8a7c476804b0b6298b52062c0d36068490e12a0aa28cffe0541bed9f3f66e2f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d8a7c476804b0b6298b52062c0d36068490e12a0aa28cffe0541bed9f3f66e2f.exe
Resource
win10v2004-20240226-en
General
-
Target
d8a7c476804b0b6298b52062c0d36068490e12a0aa28cffe0541bed9f3f66e2f
-
Size
417KB
-
MD5
943083b1d9fa6fdbb64da6c36c56d3d4
-
SHA1
e3d5af8e22673889fbe3817091a4576d4ed2342d
-
SHA256
d8a7c476804b0b6298b52062c0d36068490e12a0aa28cffe0541bed9f3f66e2f
-
SHA512
1ed7cbbc994f9dbc9a374a79270e7df9b399c880523144184bd996664989d8d25a6fd85a728ac6dbcdd3e30e1488b8d5d9d8590f51b4e707420b74dab8d380b6
-
SSDEEP
12288:shTlLYajrx8pApm+Evw+iq9ZYeHpqMXM/X/09Ii06MN:shTlLNQAw+Evw+KeHpqMXM/X/0F06MN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d8a7c476804b0b6298b52062c0d36068490e12a0aa28cffe0541bed9f3f66e2f
Files
-
d8a7c476804b0b6298b52062c0d36068490e12a0aa28cffe0541bed9f3f66e2f.exe windows:5 windows x86 arch:x86
ea59045788e9155d8fef6335122ee15f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetSystemTimeAsFileTime
ExitThread
CreateThread
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
HeapSize
GetACP
IsValidCodePage
GetStdHandle
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetTickCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetFileTime
GetFileSizeEx
SetErrorMode
GetCurrentDirectoryA
WritePrivateProfileStringA
GetModuleHandleW
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
SuspendThread
SetThreadPriority
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetCurrentProcessId
GetModuleFileNameA
InterlockedDecrement
GetModuleFileNameW
lstrlenA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
LoadLibraryA
SetLastError
MultiByteToWideChar
lstrcmpW
GetModuleHandleA
GetProcAddress
GetVersionExA
OutputDebugStringA
DeviceIoControl
FreeResource
GlobalLock
GlobalUnlock
GlobalFree
MulDiv
CreateEventA
ResumeThread
GlobalAlloc
SetEvent
WaitForSingleObject
ResetEvent
GetLocalTime
SetFilePointerEx
GetSystemTime
Sleep
WriteFile
MoveFileA
FormatMessageA
LocalFree
GetFileAttributesA
GetLastError
CreateFileA
CloseHandle
SetFilePointer
ReadFile
GetDriveTypeA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SetHandleCount
SizeofResource
user32
RegisterClipboardFormatA
PostThreadMessageA
ReleaseCapture
SetCapture
UnregisterClassA
LoadCursorA
GetSysColorBrush
CharUpperA
SetWindowContextHelpId
MapDialogRect
GetDesktopWindow
CreateDialogIndirectParamA
EndDialog
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
GetWindowThreadProcessId
GetCursorPos
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
CheckDlgButton
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
DestroyIcon
ReleaseDC
CreateIconIndirect
GetDC
GetIconInfo
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
IntersectRect
SystemParametersInfoA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableA
IsChild
CharNextA
DrawStateA
GetSysColor
CopyRect
InflateRect
OffsetRect
FillRect
FrameRect
DrawFocusRect
SendMessageA
GetWindowRect
GetClientRect
ClientToScreen
InvalidateRect
GetActiveWindow
GetNextDlgTabItem
GetParent
WindowFromPoint
EnableWindow
GetWindowLongA
SetCursor
PostMessageA
TrackPopupMenuEx
GetSubMenu
LoadImageA
DestroyCursor
DestroyMenu
DrawIcon
AppendMenuA
GetSystemMenu
IsIconic
LoadIconA
GetSystemMetrics
MessageBoxA
SetRect
SendMessageTimeoutA
GetWindow
GetWindowPlacement
gdi32
CreatePen
CreateFontIndirectA
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
DPtoLP
DeleteObject
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetClipBox
GetDeviceCaps
CreateSolidBrush
CreateCompatibleBitmap
GetObjectA
GetPixel
SetPixel
CreateBitmap
CreateCompatibleDC
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
GetStockObject
PtVisible
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegCreateKeyA
shell32
ShellExecuteExA
comctl32
_TrackMouseEvent
shlwapi
PathFindFileNameA
PathRemoveFileSpecW
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoInitializeEx
CoCreateInstance
CoUninitialize
CoRevokeClassObject
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromString
oleaut32
OleLoadPicture
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
Sections
.text Size: 282KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ