Static task
static1
Behavioral task
behavioral1
Sample
c84be3190c646c60bbde474868c499b0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c84be3190c646c60bbde474868c499b0.exe
Resource
win10v2004-20240226-en
General
-
Target
c84be3190c646c60bbde474868c499b0
-
Size
46KB
-
MD5
c84be3190c646c60bbde474868c499b0
-
SHA1
c61bea5837d7e55ce3b2725d82d469d1b604fd0a
-
SHA256
d0fa39dd2ef9ec5d9c30faa41cc65d0aa9dcac8c1018de0e3f1979a110d65d69
-
SHA512
c5fce73e976530d7554cbc103b89a441711bf838c9b4d83e9f39431e9936dbbb532396fa9a2b236c49cbe99ba4051675595691919b6bd663e6ccf1180844cbcb
-
SSDEEP
768:5+2ZiZ/qJVripwp7uiddiF43j5ac2bV1GE0ug/mmOujkOkeCeISVc+:5+ry/rQwp7PddiFQFh21b0u0vjq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c84be3190c646c60bbde474868c499b0
Files
-
c84be3190c646c60bbde474868c499b0.exe windows:5 windows x86 arch:x86
16ee59b4126a47aa1f63cea68448cf00
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PeekMessageW
OpenWindowStationA
GetDlgItem
GetForegroundWindow
GetMessageW
ExitWindowsEx
GetCursorPos
DrawIcon
EndDialog
DispatchMessageW
SendMessageW
SetProcessWindowStation
GetClassNameW
CloseDesktop
GetDlgItemTextA
LoadCursorW
ToUnicode
OpenDesktopA
FindWindowExW
GetWindowTextW
PeekMessageA
CloseWindowStation
CharLowerBuffA
SetThreadDesktop
GetMessageA
GetWindowLongW
GetWindowThreadProcessId
GetKeyboardState
GetIconInfo
MsgWaitForMultipleObjects
GetClipboardData
GetDlgItemTextW
GetKeyState
kernel32
ReleaseMutex
SetThreadPriority
CreateDirectoryW
GetProcessTimes
GetCurrentProcessId
GetSystemTime
SetFilePointer
LeaveCriticalSection
GetComputerNameW
GetTimeZoneInformation
FindNextFileW
CreateFileW
DisconnectNamedPipe
lstrcmpiA
SetFileAttributesW
SetLastError
WriteFile
GetTickCount
GetUserDefaultUILanguage
GetFileSizeEx
CreateEventW
FindClose
GetCurrentThreadId
GetLocalTime
CreateFileMappingW
GetLastError
SystemTimeToFileTime
GetVersionExW
lstrcpyA
ResetEvent
Sleep
lstrcpynW
SetEndOfFile
FindResourceW
SetFileTime
HeapFree
InitializeCriticalSection
HeapReAlloc
lstrcpyW
WaitForSingleObject
EnterCriticalSection
WriteProcessMemory
OpenProcess
GetFileSize
lstrlenA
GetTempFileNameW
MultiByteToWideChar
GetModuleHandleA
CreateThread
GetSystemTimeAsFileTime
GetProcessHeap
OpenMutexW
GetModuleFileNameA
CreateMutexW
GlobalLock
ReadFile
lstrcmpiW
GetModuleFileNameW
Sections
.etupyb Size: 36KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.qlgb Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yxyvsn Size: 7KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ