Static task
static1
Behavioral task
behavioral1
Sample
cd22fadff99f66932221453d65d30997.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
cd22fadff99f66932221453d65d30997.exe
Resource
win10v2004-20240226-en
General
-
Target
cd22fadff99f66932221453d65d30997
-
Size
156KB
-
MD5
cd22fadff99f66932221453d65d30997
-
SHA1
ca11637b64367abe2c0a407706807cacf6e5d52f
-
SHA256
76fb504d58382b81aef504a11d65e977a099f253157194a8059956596207676c
-
SHA512
f1f707164d515c5690b059a670abea5c08eb9dcfe01f901be963629d7c53ff03355038ad6ea5c82590768444d41406dae1d06cdcf36b9b489e02a644a7477378
-
SSDEEP
3072:4ytvmyGuS+/oPfWmL/bcY0dj96aGxkCSlxeNPjl:RviJBTbcPbTeN5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cd22fadff99f66932221453d65d30997
Files
-
cd22fadff99f66932221453d65d30997.exe windows:4 windows x86 arch:x86
67d4ebcc56ea67a4327282655bfe9e78
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Read
ImageList_Add
ImageList_Draw
oleaut32
OleLoadPicture
SafeArrayGetElement
VariantCopyInd
SysStringLen
SafeArrayCreate
advapi32
GetLengthSid
GetUserNameA
version
VerInstallFileA
GetFileVersionInfoSizeA
VerQueryValueA
user32
GetMessagePos
FindWindowA
GetMenu
GetWindow
GetCapture
GetWindowTextA
GetScrollInfo
GetMenuState
BeginPaint
GetFocus
TrackPopupMenu
EnumThreadWindows
GetClipboardData
GetSysColorBrush
GetScrollPos
DrawMenuBar
EnableMenuItem
ShowScrollBar
GetPropA
GetSubMenu
GetMenuItemInfoA
IsChild
IsDialogMessageA
GetScrollRange
DrawIcon
GetParent
GetSysColor
DeferWindowPos
IsWindowEnabled
GetCursor
CreateIcon
IsMenu
IsWindowVisible
GetMenuStringA
GetMenuItemID
msvcrt
atan
calloc
memmove
strcmp
kernel32
GetStdHandle
GetCurrentThread
GetCurrentThreadId
GetProcessHeap
GetACP
ResetEvent
ExitProcess
LoadLibraryA
MulDiv
LoadLibraryExA
LockResource
CompareStringA
LocalAlloc
GetDateFormatA
lstrcpynA
GetLocalTime
GetCurrentProcess
lstrlenA
FindResourceA
GetCurrentProcessId
GetVersionExA
GetLastError
CreateEventA
LocalFree
GetStartupInfoA
WriteFile
EnterCriticalSection
SetFilePointer
GetModuleFileNameA
FindFirstFileA
SetEndOfFile
GetLocaleInfoA
GetCPInfo
GetFileAttributesA
lstrcpyA
GetVersion
VirtualFree
GlobalAlloc
HeapFree
GlobalDeleteAtom
GetFileSize
SetHandleCount
ExitThread
FreeResource
GlobalAddAtomA
GetThreadLocale
GetFileType
VirtualAlloc
WaitForSingleObject
FormatMessageA
WideCharToMultiByte
HeapDestroy
VirtualAllocEx
SetLastError
SetThreadLocale
HeapAlloc
EnumCalendarInfoA
GetSystemDefaultLangID
SetErrorMode
ReadFile
GetStringTypeA
GetModuleHandleA
lstrcmpA
CreateFileA
DeleteCriticalSection
gdi32
GetBitmapBits
SaveDC
LineTo
CreateBrushIndirect
CreateDIBitmap
Sections
CODE Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 116KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 1024B - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE