Static task
static1
Behavioral task
behavioral1
Sample
d3aaaf96a2edbe84f29d387fec4ffd7c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d3aaaf96a2edbe84f29d387fec4ffd7c.exe
Resource
win10v2004-20240226-en
General
-
Target
d3aaaf96a2edbe84f29d387fec4ffd7c
-
Size
2.0MB
-
MD5
d3aaaf96a2edbe84f29d387fec4ffd7c
-
SHA1
259e7a7e5b52d7ddbbf5c6590be8de6d5ed7ebab
-
SHA256
d2635d9cca89f98ee935cd8057bc75e499ec7cd6951d32d7078458845f902c47
-
SHA512
4a1d20a12c342b32045e4fef101097a8ee1aec3aa0d0a5c810d453faa4ee9acd7082fe9ad90f63ed9d0007cb9c5810250c89bdb8206db04bca266bf592371f18
-
SSDEEP
49152:wM02cXAfMdMykYEX/LnyczY39x+SS9tomu8PwK2bbRmDel:wM02sAEdMT/by/9YSwtomu86bbRmDK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3aaaf96a2edbe84f29d387fec4ffd7c
Files
-
d3aaaf96a2edbe84f29d387fec4ffd7c.exe windows:5 windows
b186b4bb071578f32d07983fe0a751d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
WriteConsoleOutputCharacterW
WritePrivateProfileStringW
WriteProcessMemory
lstrcat
lstrcmpW
lstrcpynA
lstrlenA
VirtualAlloc
BindIoCompletionCallback
CloseHandle
CommConfigDialogA
CommConfigDialogW
WideCharToMultiByte
WaitForSingleObject
WaitForMultipleObjects
VirtualProtect
UnhandledExceptionFilter
TlsSetValue
TlsGetValue
TerminateThread
CompareStringW
CreateEventA
CreateEventW
CreateFileW
CreateMutexW
CreateThread
DeleteCriticalSection
DeviceIoControl
DnsHostnameToComputerNameA
DuplicateHandle
EnterCriticalSection
EnumUILanguagesA
ExitProcess
ExpandEnvironmentStringsW
FatalAppExitA
FileTimeToLocalFileTime
FileTimeToSystemTime
FlushConsoleInputBuffer
FlushInstructionCache
FormatMessageA
FormatMessageW
FreeLibrary
GetCommandLineW
GetComputerNameA
GetComputerNameW
TerminateProcess
TerminateJobObject
Sleep
SetupComm
SetVolumeLabelA
SetUnhandledExceptionFilter
SetLastError
SetEvent
SetEnvironmentVariableW
SetDefaultCommConfigA
RtlFillMemory
ReplaceFileW
ReadProcessMemory
ReadConsoleOutputCharacterW
RaiseException
QueryPerformanceFrequency
QueryPerformanceCounter
ProcessIdToSessionId
OutputDebugStringW
OpenProcess
OpenJobObjectW
OpenFileMappingA
MultiByteToWideChar
MulDiv
LocalReAlloc
LocalFree
LocalFlags
LocalAlloc
LoadLibraryW
LoadLibraryA
LeaveCriticalSection
IsBadWritePtr
IsBadReadPtr
InterlockedIncrement
InterlockedExchangeAdd
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSection
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GlobalUnlock
GlobalLock
GetCurrentConsoleFont
GlobalFree
GlobalFindAtomW
GlobalAlloc
GetWindowsDirectoryW
GetVersionExW
GetVersionExA
GetVersion
GetUserDefaultLCID
GetTimeFormatW
GetTimeFormatA
GetTickCount
GetTempPathW
GetTempFileNameA
GetSystemTimeAsFileTime
GetSystemDirectoryW
GetSystemDefaultLangID
GetStartupInfoA
GetProcAddress
GetPrivateProfileStructW
GetModuleHandleW
GetModuleHandleA
GetLastError
GetFileSize
GetDefaultCommConfigW
GetDateFormatW
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
AreFileApisANSI
user32
wsprintfW
WindowFromPoint
WinHelpW
WinHelpA
UpdateWindow
UnhookWindowsHookEx
TranslateMessage
TranslateAcceleratorW
SystemParametersInfoW
SystemParametersInfoA
ShowWindow
SetWindowsHookExW
SetWindowWord
SetWindowTextW
SetWindowTextA
SetWindowRgn
SetWindowPos
SetWindowLongW
SetWindowLongA
SetUserObjectInformationW
SetTimer
SetSystemCursor
SetScrollInfo
SetRectEmpty
SetRect
SetPropW
SetMenuInfo
SetForegroundWindow
SetFocus
SetCursor
SendNotifyMessageA
SendMessageW
SendMessageA
RemovePropW
ReleaseDC
ReleaseCapture
RegisterWindowMessageW
RegisterWindowMessageA
RegisterClipboardFormatW
RegisterClipboardFormatA
RegisterClassW
RegisterClassA
RedrawWindow
PostThreadMessageA
PostQuitMessage
PostMessageW
PostMessageA
PeekMessageA
OffsetRect
MsgWaitForMultipleObjects
MoveWindow
MessageBoxW
MessageBoxA
MapWindowPoints
LoadStringW
LoadStringA
LoadKeyboardLayoutW
LoadIconW
LoadIconA
LoadCursorW
LoadBitmapW
KillTimer
IsWindowVisible
IsWindowEnabled
IsRectEmpty
IsIconic
IsHungAppWindow
IsDialogMessageA
InvalidateRect
IntersectRect
InflateRect
GetWindowTextLengthW
GetWindowRgn
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindowLongA
GetWindowDC
GetUserObjectInformationW
GetUpdateRect
GetTitleBarInfo
GetThreadDesktop
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetProcessWindowStation
GetParent
GetMessageA
GetMenu
GetKeyState
GetIconInfo
GetFocus
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDCEx
GetDC
GetCursorPos
GetCursor
GetClipboardSequenceNumber
GetClientRect
GetClassNameW
GetClassInfoA
GetCapture
FrameRect
FindWindowW
FindWindowExW
FindWindowExA
FindWindowA
FillRect
EnumPropsW
EndPaint
EndDeferWindowPos
EnableWindow
DrawTextW
DrawTextA
DrawIcon
DrawFrameControl
DrawFocusRect
DrawEdge
DrawAnimatedRects
DispatchMessageA
DestroyWindow
DefWindowProcW
DefWindowProcA
DefDlgProcW
DefDlgProcA
DdeFreeDataHandle
CreateWindowExW
CreateWindowExA
CreateMDIWindowA
CreateDialogParamW
CreateDialogParamA
ChangeMenuW
CallWindowProcW
CallNextHookEx
BeginPaint
AttachThreadInput
LoadCursorA
gdi32
EngStretchBlt
EqualRgn
ExcludeClipRect
ExtTextOutW
FillPath
GdiConsoleTextOut
GdiConvertBrush
GdiEntry10
GdiEntry12
GdiGetCharDimensions
GdiQueryTable
GdiTransparentBlt
GetCharWidth32A
GetCharWidth32W
GetClipBox
GetClipRgn
GetCurrentObject
GetDIBits
GetDeviceCaps
GetEUDCTimeStamp
GetGraphicsMode
GetLogColorSpaceA
GetNearestColor
GetNearestPaletteIndex
GetObjectA
GetObjectType
GetObjectW
GetPaletteEntries
GetRgnBox
GetStockObject
GetTextExtentPoint32W
GetTextExtentPointA
EngGetCurrentCodePage
GetTextMetricsW
GetViewportOrgEx
GetWindowOrgEx
IntersectClipRect
OffsetRgn
PATHOBJ_bEnumClipLines
PatBlt
PtInRegion
RealizePalette
RectVisible
RemoveFontResourceW
ResizePalette
RestoreDC
SaveDC
SelectClipRgn
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetDIBits
SetDIBitsToDevice
SetGraphicsMode
SetRectRgn
SetStretchBltMode
SetTextColor
SetViewportOrgEx
SetVirtualResolution
SetWindowOrgEx
StretchBlt
StretchDIBits
EngFindResource
EngCreateSemaphore
EngCreateClip
EndPath
DeleteObject
DeleteDC
CreateSolidBrush
CreateRoundRectRgn
CreateRectRgnIndirect
CreateRectRgn
CreatePatternBrush
CreatePalette
CreateMetaFileW
CreateHalftonePalette
CreateFontIndirectW
CreateFontIndirectA
CreateDIBSection
CreateCompatibleDC
BeginPath
CreateCompatibleBitmap
CreateBitmap
CopyEnhMetaFileA
CombineRgn
BitBlt
GetTextExtentPointW
advapi32
RegQueryValueExA
GetUserNameW
OpenProcessToken
OpenThreadToken
RegCloseKey
RegCreateKeyExA
RegCreateKeyExW
RegOpenKeyW
RegSetValueExW
RegSetValueExA
RegQueryValueExW
GetUserNameA
RegOpenKeyExW
RegOpenKeyExA
RegEnumKeyW
RegEnumKeyA
shell32
ShellHookProc
ShellExecuteW
ShellAboutW
SHLoadNonloadedIconOverlayIdentifiers
SHLoadInProc
SHInvokePrinterCommandA
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHGetMalloc
SHGetInstanceExplorer
SHGetFolderPathA
SHGetFolderLocation
SHGetDataFromIDListW
SHFreeNameMappings
SHEmptyRecycleBinA
SHCreateProcessAsUserW
SHChangeNotify
ExtractIconA
ExtractAssociatedIconExA
DragQueryFileAorW
DragFinish
DoEnvironmentSubstW
DoEnvironmentSubstA
CheckEscapesW
ole32
CLSIDFromString
CoCreateInstance
CoFreeUnusedLibraries
CoInitialize
CoInitializeEx
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemFree
CoUninitialize
CreateStreamOnHGlobal
StringFromGUID2
shlwapi
StrStrA
StrCmpNW
StrCmpNIA
StrChrA
comctl32
InitCommonControlsEx
ord17
ImageList_ReplaceIcon
ImageList_LoadImageW
ImageList_Draw
_TrackMouseEvent
ImageList_Create
msvcrt
__p__fmode
wcscmp
toupper
strncpy
exit
_onexit
_initterm
_ftol
_exit
_except_handler3
_controlfp
_cexit
_XcptFilter
__argc
__argv
__dllonexit
__getmainargs
__p__commode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ