Static task
static1
Behavioral task
behavioral1
Sample
e42d735a519713d88832f38132c7089e9380fa4b8dad0b22ffa83d30c66d1198.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e42d735a519713d88832f38132c7089e9380fa4b8dad0b22ffa83d30c66d1198.exe
Resource
win10v2004-20240226-en
General
-
Target
e42d735a519713d88832f38132c7089e9380fa4b8dad0b22ffa83d30c66d1198
-
Size
3.3MB
-
MD5
dc1fab2c3e39297e8973d4154b33ef8e
-
SHA1
cf30c2d4bdf8f24a0023c373370907bef2d5d057
-
SHA256
e42d735a519713d88832f38132c7089e9380fa4b8dad0b22ffa83d30c66d1198
-
SHA512
86431dcf629d5461be807ca50e2b84addc3e3705cc4e1e15fa71713bc97ced1900142f4ad7a24304fcaefdd76c767870daeb195eb453d5ce2876db0c3c178089
-
SSDEEP
49152:t/Nsxi03zDWi26fs2cWDAbcl7jkv4+9Ry4kjCz:t/NsT0uDhEv4n4M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e42d735a519713d88832f38132c7089e9380fa4b8dad0b22ffa83d30c66d1198
Files
-
e42d735a519713d88832f38132c7089e9380fa4b8dad0b22ffa83d30c66d1198.exe windows:4 windows x86 arch:x86
8472290259d58812608e3184c0b77c35
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
GetACP
HeapReAlloc
HeapSize
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
TerminateProcess
HeapFree
HeapAlloc
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetFileTime
GetFileSize
GetProcAddress
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
SetErrorMode
GetThreadLocale
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GetLastError
GlobalFlags
FileTimeToLocalFileTime
FileTimeToSystemTime
MulDiv
SetLastError
CloseHandle
GetCurrentThread
FormatMessageA
LocalFree
GlobalReAlloc
GlobalAlloc
lstrcpynA
lstrcmpA
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GetTickCount
GetModuleHandleA
VirtualFree
user32
MessageBeep
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
LoadCursorA
PtInRect
GetClassNameA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
DestroyMenu
LoadStringA
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
SetCursor
PostQuitMessage
GetDesktopWindow
GetDC
ReleaseDC
wvsprintfA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
CopyRect
CharUpperA
RegisterClipboardFormatA
PostThreadMessageA
GetCursorPos
IsWindowVisible
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
LoadIconA
SendMessageA
EnableWindow
EnableMenuItem
UnregisterClassA
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
LPtoDP
GetBkColor
GetTextColor
DPtoLP
SaveDC
GetWindowExtEx
GetViewportExtEx
GetDeviceCaps
DeleteObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
DeleteDC
GetMapMode
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
comctl32
ImageList_Destroy
ord17
odbc32
ord17
ord72
ord4
ord48
ord49
ord20
ord59
ord8
ord44
ord10
ord5
ord16
ord13
ord18
ord11
ord3
ord14
ord9
ord15
ord51
ord45
ord50
ord1
ord2
ord41
ord68
ord12
ord46
ord19
oledlg
ord8
ole32
OleUninitialize
OleInitialize
CoFreeUnusedLibraries
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
olepro32
ord253
oleaut32
SysAllocStringByteLen
VariantTimeToSystemTime
SysStringLen
VariantChangeType
SysAllocString
VariantCopy
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 324KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ