Static task
static1
Behavioral task
behavioral1
Sample
4a89bdfb713a791f5f6b003198bffd0a4841025120bc04980de3d3ccf82f82b8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a89bdfb713a791f5f6b003198bffd0a4841025120bc04980de3d3ccf82f82b8.exe
Resource
win10v2004-20240226-en
General
-
Target
4a89bdfb713a791f5f6b003198bffd0a4841025120bc04980de3d3ccf82f82b8
-
Size
2.0MB
-
MD5
40e5f35165bcd007162e6f794b40a5f4
-
SHA1
b650d0a008f98d6d24d675a3cb56dd2b894ef6f0
-
SHA256
4a89bdfb713a791f5f6b003198bffd0a4841025120bc04980de3d3ccf82f82b8
-
SHA512
4a73e926a27ac40376b839fc2e37bae2e484ecd56c92bb662e5e67e9120a7caf5f9a8cd06852bf88a94ea74730a7c686a7a71f2c975af390d9dcd033ce5d5bd3
-
SSDEEP
12288:hb/6fwIdaGmIUERUm1VzIQcWVKtmZTAns3nchuC7sdCCxeHb1piMTSXTLyV5Dn+s:hb/aaGDUERUYzIQfKE33ZxGzGyV5Kg3p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a89bdfb713a791f5f6b003198bffd0a4841025120bc04980de3d3ccf82f82b8
Files
-
4a89bdfb713a791f5f6b003198bffd0a4841025120bc04980de3d3ccf82f82b8.exe windows:5 windows x86 arch:x86
ffcb319d88fbb666981974b126a220fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
GetFileInformationByHandle
GetDriveTypeA
WriteFile
SetFileTime
GetCurrentDirectoryA
GetFileAttributesA
CreateDirectoryA
LocalFileTimeToFileTime
SystemTimeToFileTime
ReadFile
SetFilePointer
GetCurrentThreadId
GetWindowsDirectoryA
WinExec
FreeLibrary
GetModuleFileNameA
lstrcpyA
lstrcatA
WritePrivateProfileStringA
DeleteFileA
CreateFileA
UnmapViewOfFile
CloseHandle
FindFirstFileA
FindClose
lstrlenW
GetLastError
SetLastError
GetProcAddress
GetModuleHandleA
LoadLibraryA
FreeResource
GetCPInfo
lstrlenA
lstrcmpiA
FindResourceA
LoadResource
LockResource
GetSystemDirectoryA
VerSetConditionMask
VerifyVersionInfoA
SizeofResource
WideCharToMultiByte
MultiByteToWideChar
SleepEx
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetStringTypeW
GetStringTypeA
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
IsValidCodePage
GetACP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStdHandle
VirtualFree
HeapCreate
HeapSize
HeapReAlloc
CreateThread
ExitThread
VirtualAlloc
GetStartupInfoA
GetCommandLineA
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
ExitProcess
Sleep
RaiseException
GetVersion
GetVersionExA
RtlUnwind
HeapAlloc
HeapFree
GetFileTime
GlobalFree
GlobalUnlock
GlobalLock
lstrcmpW
CompareStringA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
MulDiv
LocalFree
FormatMessageA
GlobalAlloc
GetModuleFileNameW
InterlockedDecrement
WaitForSingleObject
lstrcmpA
GetCurrentProcessId
InterlockedExchange
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetOEMCP
GetModuleHandleW
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileSizeEx
user32
KillTimer
wsprintfA
GetCursorPos
EndDialog
GetDlgItem
DestroyWindow
CreateDialogIndirectParamA
GetWindow
GetWindowPlacement
GetMenu
CallWindowProcA
DefWindowProcA
GetDlgCtrlID
DeferWindowPos
EqualRect
ScreenToClient
SetTimer
RegisterClassA
GetClassInfoA
GetClassInfoExA
CreateWindowExA
MessageBoxA
IsWindowVisible
SetMenu
TrackPopupMenu
MapWindowPoints
PeekMessageA
GetMessagePos
GetMessageTime
UnhookWindowsHookEx
GetTopWindow
DispatchMessageA
GetLastActivePopup
GetWindowTextA
GetWindowTextLengthA
GetFocus
RemovePropA
GetPropA
SetPropA
GetClassNameA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
GetCapture
IsChild
WinHelpA
SendDlgItemMessageA
RegisterWindowMessageA
CheckMenuItem
EnableMenuItem
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
MoveWindow
DestroyMenu
GetMenuStringA
SetRectEmpty
ValidateRect
TranslateMessage
GetMessageA
BeginPaint
EndPaint
PostQuitMessage
CharUpperA
LoadCursorA
AdjustWindowRectEx
UnregisterClassA
GetWindowDC
SetWindowRgn
VkKeyScanA
keybd_event
SetForegroundWindow
SetFocus
GetKeyState
GetForegroundWindow
AttachThreadInput
GetWindowThreadProcessId
IsWindow
IsWindowEnabled
FindWindowA
ShowWindow
SetWindowPos
SetWindowLongA
LoadIconA
SetActiveWindow
UpdateWindow
IsIconic
GetSystemMenu
DrawIcon
PtInRect
RedrawWindow
DestroyCursor
LoadImageA
PostMessageA
SetCursor
GetWindowLongA
WindowFromPoint
GetParent
GetNextDlgTabItem
GetActiveWindow
InvalidateRect
ClientToScreen
GetClientRect
GetWindowRect
SendMessageA
DrawFocusRect
FrameRect
OffsetRect
InflateRect
GetIconInfo
CreateIconIndirect
DrawStateA
IsMenu
GetMenuItemInfoA
GetSystemMetrics
SystemParametersInfoA
DrawIconEx
DestroyIcon
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetSysColorBrush
GetSysColor
GetDesktopWindow
ReleaseDC
GetDC
EnableWindow
SetRect
CopyRect
ModifyMenuA
GetSubMenu
GetMenuState
GetMenuItemID
GetMenuItemCount
AppendMenuA
CreatePopupMenu
CreateMenu
DrawEdge
FillRect
LoadBitmapA
gdi32
ExtTextOutA
TextOutA
RectVisible
PtVisible
Escape
SelectObject
DeleteObject
DeleteDC
GetTextExtentPoint32A
SetPixel
GetPixel
BitBlt
PatBlt
Rectangle
Ellipse
GetBkMode
GetDeviceCaps
CreateCompatibleDC
GetObjectA
CreateCompatibleBitmap
CreateFontIndirectA
GetTextExtentPoint32W
GetStockObject
SetTextColor
SetBkColor
CreateBitmap
StretchBlt
CreateFontA
CreateRectRgnIndirect
CreateRoundRectRgn
GetTextColor
CreatePolygonRgn
FillRgn
FrameRgn
CombineRgn
CreateRectRgn
CreateDIBSection
DPtoLP
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectClipRgn
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetBkColor
StretchDIBits
GetCharWidthA
GetClipBox
CreateSolidBrush
CreatePen
advapi32
CryptEncrypt
CryptDestroyKey
CryptGetHashParam
CryptDestroyHash
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CryptHashData
CryptImportKey
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
CryptCreateHash
shell32
ShellExecuteExA
ShellExecuteA
comctl32
_TrackMouseEvent
shlwapi
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathStripPathA
PathIsUNCA
wldap32
ord46
ord41
ord22
ord211
ord143
ord60
ord50
ord26
ord30
ord200
ord32
ord35
ord79
ord33
ord301
ord27
ws2_32
WSAGetLastError
htonl
gethostname
ioctlsocket
listen
accept
recvfrom
sendto
getaddrinfo
freeaddrinfo
connect
socket
closesocket
getpeername
getsockopt
htons
bind
ntohs
getsockname
setsockopt
WSACleanup
WSAStartup
WSASetLastError
__WSAFDIsSet
ntohl
select
recv
send
WSAIoctl
crypt32
CertFreeCertificateContext
oleacc
LresultFromObject
CreateStdAccessibleObject
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comdlg32
GetFileTitleA
oleaut32
VariantChangeType
VariantInit
VariantClear
SysAllocStringLen
Sections
.text Size: 482KB - Virtual size: 482KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ