Static task
static1
Behavioral task
behavioral1
Sample
df8da34df7ce4f7b2ef1dad5fd0c2197.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df8da34df7ce4f7b2ef1dad5fd0c2197.exe
Resource
win10v2004-20240226-en
General
-
Target
df8da34df7ce4f7b2ef1dad5fd0c2197
-
Size
415KB
-
MD5
df8da34df7ce4f7b2ef1dad5fd0c2197
-
SHA1
0d8e45fde3cf7cdc276e78a1c254edd52d2b3d6f
-
SHA256
97cf770c083e0a6bd8163e1098fe6e2861191ef284ff474d3697befb34cdc6b2
-
SHA512
1e67ea96dd08a363774713d182958a1d69baf792dbcf2d29c54c063054a757cb07a4744c1d1551c37e7d9650090b2af643f1983d60e39fe7443a8330fcb2a49f
-
SSDEEP
12288:8njqvOrqgOnn/BWZ0b6RwbcOEQWlsrD/BKJPV:qDObeRwcOZW8D/BKj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df8da34df7ce4f7b2ef1dad5fd0c2197
Files
-
df8da34df7ce4f7b2ef1dad5fd0c2197.exe windows:4 windows x86 arch:x86
630a24eb48096bab99cb95d05fe91bf0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumKeyExA
CryptDuplicateKey
LookupAccountSidW
InitiateSystemShutdownA
CryptExportKey
RegConnectRegistryA
RegDeleteKeyA
CryptAcquireContextA
gdi32
UpdateICMRegKeyA
CreateHatchBrush
GetCharWidth32W
CopyMetaFileW
SetPixelFormat
PlgBlt
GetTextExtentPointW
SetBrushOrgEx
GetICMProfileW
SetPolyFillMode
GdiPlayDCScript
CreateEllipticRgnIndirect
StartDocA
AngleArc
CombineTransform
GetWindowExtEx
GetICMProfileA
CreateScalableFontResourceW
GetObjectType
PlayEnhMetaFileRecord
GdiPlayScript
CreatePen
GetPaletteEntries
GetTextMetricsW
shell32
FindExecutableW
SHFileOperation
ExtractAssociatedIconA
SHAppBarMessage
CheckEscapesW
ShellAboutA
SHGetDesktopFolder
ShellExecuteEx
ShellHookProc
ShellExecuteA
ExtractIconA
ShellAboutW
DragAcceptFiles
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHFormatDrive
SHBrowseForFolderW
SHGetFileInfo
SheGetDirA
wininet
InternetConfirmZoneCrossing
FtpSetCurrentDirectoryW
SetUrlCacheEntryInfoA
HttpCheckDavCompliance
InternetReadFileExA
GopherFindFirstFileA
GetUrlCacheGroupAttributeW
InternetSetOptionW
InternetShowSecurityInfoByURLW
kernel32
VirtualAlloc
GetStringTypeW
GetUserDefaultLCID
InterlockedExchange
GetLocaleInfoW
UnhandledExceptionFilter
GetEnvironmentStringsW
WriteProfileStringA
QueryPerformanceCounter
GetStartupInfoA
EnumSystemLocalesA
LockFileEx
GetTimeFormatA
SetLocalTime
GetCPInfo
GetCurrentThread
SetUnhandledExceptionFilter
VirtualFree
GetModuleFileNameW
GetFileType
FreeLibrary
LCMapStringA
GetCurrentThreadId
CompareStringA
GetStdHandle
ExitProcess
GetSystemTimeAsFileTime
InterlockedDecrement
GetLocaleInfoA
IsValidCodePage
SetLastError
SetConsoleCtrlHandler
FreeEnvironmentStringsW
GetTimeZoneInformation
HeapFree
IsDebuggerPresent
TlsFree
LoadLibraryA
GetStartupInfoW
DeleteCriticalSection
HeapAlloc
HeapDestroy
GetStringTypeA
TlsSetValue
VirtualQuery
IsValidLocale
GetCurrentProcessId
TlsAlloc
GetDateFormatA
GetModuleHandleA
Sleep
SetEnvironmentVariableA
GlobalGetAtomNameW
GetACP
GetCommandLineW
HeapCreate
lstrcmpA
HeapReAlloc
GetTickCount
InterlockedIncrement
GetCurrentProcess
TlsGetValue
GetLastError
CompareStringW
WriteFile
EnterCriticalSection
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
HeapSize
LeaveCriticalSection
MapViewOfFileEx
FlushInstructionCache
GetProcAddress
SetHandleCount
TerminateProcess
GetOEMCP
RtlUnwind
MultiByteToWideChar
LCMapStringW
GetModuleHandleW
WideCharToMultiByte
user32
ChangeClipboardChain
CreateDesktopA
DestroyAcceleratorTable
GetClassInfoExA
GetListBoxInfo
CreateWindowExA
ChangeDisplaySettingsW
GetDlgItemTextA
DdePostAdvise
SetPropA
GetClipboardSequenceNumber
SetWindowRgn
FrameRect
IsCharLowerA
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 274KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ