Static task
static1
Behavioral task
behavioral1
Sample
d366eb82a85b87cbcab391f3a0dd0f56.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d366eb82a85b87cbcab391f3a0dd0f56.exe
Resource
win10v2004-20240226-en
General
-
Target
d366eb82a85b87cbcab391f3a0dd0f56
-
Size
115KB
-
MD5
d366eb82a85b87cbcab391f3a0dd0f56
-
SHA1
58a10feb2db726533ecc596e205589634f47b1f3
-
SHA256
c1bd324980744b6247dabc3a1abdb3b9a58f57239d8291feecb93134b9eef575
-
SHA512
f5f25d91e690d61f163eebe5d469887da2b858bca9ce620539c044a67de50f11ad0efb38287ed546221f791a9ff0c2adaf092f76b6065b979f468b2ec8b83bec
-
SSDEEP
3072:3JYalouBik73i2XZXAnl+XTwEXqwk7kR+IxxF8P:3GaoufXVrxT8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d366eb82a85b87cbcab391f3a0dd0f56
Files
-
d366eb82a85b87cbcab391f3a0dd0f56.exe windows:4 windows x86 arch:x86
f64218a1ebf6faf8aac82f9adcc7fb5e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_wcsnicmp
atoi
RtlDeleteCriticalSection
wcscat
NtWaitForSingleObject
advapi32
RegEnumKeyExA
comctl32
ImageList_DragShowNolock
ImageList_Draw
ImageList_Read
ImageList_Destroy
ImageList_Remove
ImageList_Create
ImageList_Add
ImageList_GetBkColor
ImageList_DrawEx
ImageList_Write
kernel32
WaitForSingleObject
MoveFileA
GetCurrentProcess
FreeLibrary
ResetEvent
LoadLibraryExA
SetErrorMode
VirtualQuery
GetOEMCP
GlobalAddAtomA
lstrcpynA
CreateEventA
SetThreadLocale
CreateFileA
GetLocalTime
GetACP
GetModuleFileNameA
GetFileAttributesA
GetEnvironmentStrings
LockResource
lstrcmpiA
LoadLibraryA
GlobalDeleteAtom
DeleteFileA
LocalAlloc
DeleteCriticalSection
GetStdHandle
FindFirstFileA
lstrcpyA
GetCurrentThreadId
VirtualFree
GetThreadLocale
InitializeCriticalSection
GlobalFindAtomA
HeapAlloc
SetEndOfFile
LocalReAlloc
MoveFileExA
HeapDestroy
LoadResource
GetVersionExA
GetLastError
ExitThread
CompareStringA
EnterCriticalSection
WriteFile
GetFullPathNameA
GetUserDefaultLCID
GetCurrentProcessId
GetStringTypeA
GetCurrentThread
WideCharToMultiByte
GetDateFormatA
RaiseException
GetStringTypeW
SizeofResource
GlobalAlloc
EnumCalendarInfoA
CloseHandle
HeapFree
GetFileSize
GetTickCount
lstrcmpA
lstrlenA
FreeResource
ReadFile
Sleep
CreateThread
MulDiv
GetSystemDefaultLangID
GetProcessHeap
FindResourceA
SetHandleCount
GetCommandLineA
VirtualAlloc
SetEvent
SetFilePointer
ExitProcess
GetStartupInfoA
GetDiskFreeSpaceA
LocalFree
GetFileType
GetLocaleInfoA
VirtualAllocEx
FormatMessageA
SetLastError
GetModuleHandleA
GetCPInfo
ole32
OleCreateStaticFromData
CLSIDFromString
CoUnmarshalInterface
CoRevokeClassObject
oleaut32
SysStringLen
GetErrorInfo
SysReAllocStringLen
version
VerInstallFileA
GetFileVersionInfoA
GetFileVersionInfoSizeA
user32
CharLowerA
EndDeferWindowPos
SetWindowLongA
DeferWindowPos
FillRect
GetSubMenu
GetSysColorBrush
GetCursor
GetMenuItemID
IsWindowEnabled
GetCursorPos
IsDialogMessageA
SetWindowPos
GetPropA
GetScrollRange
GetScrollInfo
GetDCEx
ClientToScreen
DefMDIChildProcA
RegisterClassA
HideCaret
GetMenuStringA
FindWindowA
GetDC
GetWindow
EnumThreadWindows
DispatchMessageW
SetCursor
GetMenu
EnumChildWindows
SetWindowTextA
CreateWindowExA
SetTimer
EnumWindows
CreateIcon
MessageBoxA
GetWindowTextA
IsWindowVisible
DrawEdge
CallNextHookEx
DrawTextA
GetScrollPos
ShowWindow
CreateMenu
CharNextA
DrawIcon
GetIconInfo
GetForegroundWindow
IsChild
CharLowerBuffA
DrawIconEx
GetCapture
GetClientRect
IsMenu
GetActiveWindow
GetDesktopWindow
DrawMenuBar
CallWindowProcA
GetMessagePos
CreatePopupMenu
GetClassLongA
GetDlgItem
TrackPopupMenu
EnableMenuItem
EnableWindow
CheckMenuItem
EndPaint
GetSysColor
SystemParametersInfoA
DrawFrameControl
GetMenuItemCount
DefWindowProcA
BeginPaint
DefFrameProcA
GetParent
DispatchMessageA
EnableScrollBar
GetClipboardData
GetLastActivePopup
CharToOemA
msvcrt
memset
strcmp
srand
log
abs
wcstol
tolower
memcpy
strncmp
memmove
calloc
malloc
clock
Sections
CODE Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 529B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 981B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ