Static task
static1
Behavioral task
behavioral1
Sample
d4370120883dd20669b84359dee77988.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4370120883dd20669b84359dee77988.exe
Resource
win10v2004-20240226-en
General
-
Target
d4370120883dd20669b84359dee77988
-
Size
136KB
-
MD5
d4370120883dd20669b84359dee77988
-
SHA1
072f79047742865666ee2adf06719f34fdfb55d7
-
SHA256
b2b8c9ea0ffc6331be898823dee843826c24b147fb89377399504ff2f6b2b3fa
-
SHA512
16c806b400d14491ea0543336157b005dda6ad041d4a13a0735daa543a2fe3b4b0a139a24761e153b6f69c4a23ce11ffb1052ebe4b086de6e2d0283d41825ee3
-
SSDEEP
3072:f3a1IJQFr3+Xj9U7cYwPIefuUML6PJdYLHdoDRWdO9:Pa1IGxuXxUoYeIefIL6xyHdsWdO9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4370120883dd20669b84359dee77988
Files
-
d4370120883dd20669b84359dee77988.exe windows:4 windows x86 arch:x86
8262b65b3bd2e7fca038ba4375962bf0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileStringA
GlobalUnlock
GlobalAlloc
GlobalLock
CreateFileA
GlobalFree
RtlZeroMemory
CreateThread
GetCPInfo
FlushFileBuffers
RaiseException
GetLocaleInfoA
LoadLibraryA
VirtualAlloc
GetStringTypeW
GetStringTypeA
GetProcAddress
LCMapStringW
LCMapStringA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WriteFile
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetLastError
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetModuleHandleA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetVersion
lstrlenA
GetCommandLineA
GetStartupInfoA
GetDriveTypeA
Sleep
MultiByteToWideChar
lstrcpyA
GetDiskFreeSpaceA
DeviceIoControl
lstrcmpiA
GetWindowsDirectoryA
lstrcatA
GetProcessHeap
HeapAlloc
SetFilePointer
GetLocaleInfoW
SetStdHandle
GetVolumeInformationA
WideCharToMultiByte
CloseHandle
HeapFree
lstrcmpA
user32
GetWindowTextA
MessageBoxA
LoadStringA
EnumWindows
SetForegroundWindow
RegisterClassA
DefDlgProcA
LoadIconA
LoadCursorA
WinHelpA
ShowWindow
SendDlgItemMessageA
GetWindowLongA
GetDlgItem
SetWindowLongA
SetDlgItemTextA
EndDialog
SetFocus
DialogBoxParamA
LoadBitmapA
FillRect
DrawTextA
UpdateWindow
GetDC
ReleaseDC
GetClientRect
DefWindowProcA
UnregisterClassA
SetTimer
LoadImageA
PostMessageA
wsprintfA
CreateDialogParamA
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
MsgWaitForMultipleObjects
DestroyWindow
CheckDlgButton
IsDlgButtonChecked
EnableWindow
GetDesktopWindow
GetWindowRect
MoveWindow
SetCursor
GetParent
InvalidateRect
CallWindowProcA
GetSysColor
DrawIconEx
DrawFocusRect
BeginPaint
EndPaint
SendMessageA
gdi32
CreateSolidBrush
BitBlt
DeleteDC
GetStockObject
GetObjectA
SelectObject
StretchBlt
SetBkMode
ExtTextOutA
CreateCompatibleDC
CreateBitmap
CreateCompatibleBitmap
SetBkColor
DeleteObject
GetTextExtentPoint32A
SetTextColor
advapi32
RegEnumValueA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegEnumKeyExA
RegQueryValueExA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
shell32
ExtractIconExA
ShellExecuteA
SHGetFileInfoA
ole32
CoTaskMemFree
CLSIDFromString
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemAlloc
comctl32
ord17
PropertySheetA
CreatePropertySheetPageA
shlwapi
StrStrIA
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE