Static task
static1
Behavioral task
behavioral1
Sample
caa34f505cb70d4cf60dbc937fb195e4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
caa34f505cb70d4cf60dbc937fb195e4.exe
Resource
win10v2004-20240226-en
General
-
Target
caa34f505cb70d4cf60dbc937fb195e4
-
Size
53KB
-
MD5
caa34f505cb70d4cf60dbc937fb195e4
-
SHA1
dc511bfb31a40baf23d14accadba08b0f360c88f
-
SHA256
d6ef70f70fef7a1f1b5ccdb35c2a48ab4c9f71a5cc7e77d97839f1f46cae596c
-
SHA512
3c5c20a2673ccfcaceb012b9f75581435a26c3889dd83a195a7aa7ce03c984848521068d7869f465c3bf6af60f54c9a65415262d134ba65c9f2a7c1e7e59fbc0
-
SSDEEP
1536:Inr8Kza7MBJBykJ0SVEK5O9uvJEbpvVxzX0+zW:Im7CJBykaXF9GJE173zW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource caa34f505cb70d4cf60dbc937fb195e4
Files
-
caa34f505cb70d4cf60dbc937fb195e4.exe windows:5 windows x86 arch:x86
7b4b91bb9ccee0ed78970a606f2ac253
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClassNameW
DrawIcon
SetThreadDesktop
SetProcessWindowStation
OpenDesktopA
ToUnicode
ExitWindowsEx
GetDlgItemTextW
GetKeyboardState
GetKeyState
LoadCursorW
CloseWindowStation
DispatchMessageW
EndDialog
MsgWaitForMultipleObjects
GetDlgItem
GetWindowLongW
GetWindowThreadProcessId
GetDlgItemTextA
PeekMessageA
GetCursorPos
FindWindowExW
OpenWindowStationA
CloseDesktop
GetMessageA
PeekMessageW
SendMessageW
GetClipboardData
CharLowerBuffA
GetWindowTextW
GetMessageW
GetIconInfo
GetForegroundWindow
kernel32
GlobalUnlock
GetProcessTimes
FindNextFileW
SetFileAttributesW
ReadFile
CreateFileMappingW
WriteFile
SetThreadPriority
lstrcatA
lstrcmpiA
WideCharToMultiByte
CloseHandle
WriteProcessMemory
OpenProcess
IsBadReadPtr
HeapReAlloc
GetSystemTimeAsFileTime
GetTickCount
LeaveCriticalSection
GetTempFileNameW
CreateFileW
CreateThread
CreateEventW
SetFileTime
GetLogicalDrives
FindFirstFileW
GetThreadPriority
ExpandEnvironmentStringsW
SetFilePointer
GetCurrentThreadId
ResetEvent
SetEvent
GetModuleHandleA
OpenMutexW
GetProcessHeap
lstrcpyA
FindClose
HeapFree
GetExitCodeProcess
GetModuleFileNameA
HeapAlloc
GetUserDefaultUILanguage
CreateDirectoryW
GetFileSize
CreateProcessW
lstrcpyW
EnterCriticalSection
GetModuleFileNameW
GetComputerNameW
GetSystemTime
lstrlenA
FindResourceW
CopyFileW
GetDriveTypeW
GetTimeZoneInformation
InitializeCriticalSection
UnmapViewOfFile
Sections
.tub Size: 18KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uhclaf Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lmvep Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nud Size: 26KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ