Static task
static1
Behavioral task
behavioral1
Sample
deca3965074568c22283cc98187d1bb4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
deca3965074568c22283cc98187d1bb4.exe
Resource
win10v2004-20240226-en
General
-
Target
deca3965074568c22283cc98187d1bb4
-
Size
112KB
-
MD5
deca3965074568c22283cc98187d1bb4
-
SHA1
8ec80f46d0622a66dc92a6a1e86a7a72b48a5698
-
SHA256
2f31ec334cc4797946b3ceb06ee90cacdc475d7b9295710c117220ad9567baf1
-
SHA512
197474d94599de8620c6b142293a115758e1443081c209c30b76c038fb7be91a9fd4aa5c8020097ae56dc031959c38c943b028118de20fdd49906fe137681200
-
SSDEEP
1536:FqYIqbJbIoqMJ7TPtzL00lCtIJbqIRnKXGlQkCx6Z5oauQbSnwZ6f:blFltv9bqIV8x6HoauySn9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource deca3965074568c22283cc98187d1bb4
Files
-
deca3965074568c22283cc98187d1bb4.exe windows:4 windows x86 arch:x86
e9b8b714c786a20caa0c49752a229cae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileA
kernel32
SetEndOfFile
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
CreateThread
ExitThread
HeapSize
HeapReAlloc
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
RtlUnwind
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
lstrlenW
WideCharToMultiByte
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
GetVersionExA
GetCurrentProcess
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
GetLastError
FormatMessageA
SetStdHandle
FlushFileBuffers
CreateFileA
WriteFile
ReadFile
GetOEMCP
GetCPInfo
GlobalFlags
lstrcmpA
LocalReAlloc
GetProcessVersion
TlsGetValue
GlobalReAlloc
TlsSetValue
GlobalAlloc
GlobalHandle
GlobalLock
TlsAlloc
GlobalUnlock
GlobalFree
LoadLibraryA
FreeLibrary
GetVersion
lstrcmpiA
lstrcatA
GlobalGetAtomNameA
GlobalDeleteAtom
GlobalAddAtomA
GlobalFindAtomA
GetProcAddress
lstrcpyA
GetModuleHandleA
EnterCriticalSection
lstrcpynA
SetLastError
InitializeCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCurrentThreadId
CreateEventA
SuspendThread
SetEvent
SetThreadPriority
ResumeThread
GetModuleFileNameA
CloseHandle
InterlockedIncrement
MultiByteToWideChar
SetCurrentDirectoryA
lstrlenA
GetEnvironmentStrings
InterlockedDecrement
GetEnvironmentStringsW
SetUnhandledExceptionFilter
user32
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
GetClientRect
SetWindowTextA
ShowWindow
GetSysColorBrush
ReleaseDC
GetDC
PtInRect
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
GetCapture
WinHelpA
GetClassInfoA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetDlgCtrlID
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
DestroyMenu
GetForegroundWindow
CopyRect
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
LoadStringA
UnhookWindowsHookEx
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
EnableWindow
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
EnumWindows
FindWindowA
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcA
InvalidateRect
MessageBoxA
ExitWindowsEx
IsWindowVisible
IsWindow
GetWindow
GetClassNameA
GetWindowThreadProcessId
RemovePropA
GetWindowTextA
PostMessageA
GetMessageTime
GetTopWindow
GetMessagePos
GetNextDlgTabItem
LoadBitmapA
gdi32
CreatePen
CreateBitmap
CreateSolidBrush
SetTextColor
SetBkColor
GetClipBox
GetDeviceCaps
DeleteObject
GetObjectA
SaveDC
DeleteDC
GetStockObject
RestoreDC
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SelectObject
CreateFontA
RectVisible
ExtTextOutA
PtVisible
Escape
SetBkMode
TextOutA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
comctl32
ord17
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysAllocString
VariantInit
SysAllocStringLen
SysFreeString
VariantClear
SysAllocStringByteLen
SysStringLen
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE