Static task
static1
Behavioral task
behavioral1
Sample
df4c42716928c6e7e19f4e2cf886bf086c118146d58173cef18904a44473b048.exe
Resource
win7-20240319-en
General
-
Target
df4c42716928c6e7e19f4e2cf886bf086c118146d58173cef18904a44473b048
-
Size
3.7MB
-
MD5
2539ea8eb28592d919115463f1c48824
-
SHA1
411f291c22b477b8425f00d97c8635a16f99430f
-
SHA256
df4c42716928c6e7e19f4e2cf886bf086c118146d58173cef18904a44473b048
-
SHA512
33396fa47b0d74397ebeeb075e6e09ea44e7bdf05a1a4522b73c05bec3a9b4712ba598bd89560ff33f36d414230bebec038b46cde08fbb73fa19ed05f29f459a
-
SSDEEP
98304:FSQOpugxSEUz0GbyrxGQL8JlbkpaLap8ao/H7Yk:FSQGuPE/+MGrJlbXWpj4Hkk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df4c42716928c6e7e19f4e2cf886bf086c118146d58173cef18904a44473b048
Files
-
df4c42716928c6e7e19f4e2cf886bf086c118146d58173cef18904a44473b048.exe windows:5 windows x86 arch:x86
b4166f4bd4f610ba5c5aa12c5c3a8bf1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
lstrcpynW
lstrcpyW
GetModuleHandleA
SetCurrentDirectoryA
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
WriteConsoleW
SetEndOfFile
SetStdHandle
ReadConsoleW
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetStdHandle
GetModuleHandleExW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetFileType
GetTimeZoneInformation
RtlUnwind
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
LocalFileTimeToFileTime
CreateThread
VirtualProtect
SetFileTime
GetACP
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
CreateEventW
SetLastError
QueryPerformanceCounter
GetStringTypeW
TryEnterCriticalSection
OutputDebugStringW
IsDebuggerPresent
GlobalAlloc
ReleaseSemaphore
GetCurrentDirectoryW
lstrlenW
GlobalUnlock
GlobalLock
MulDiv
SystemTimeToFileTime
SetFilePointer
FreeLibraryAndExitThread
ExitProcess
GlobalFree
GetSystemDirectoryA
DeviceIoControl
FormatMessageW
GetModuleFileNameW
GetCommandLineW
GetCurrentThreadId
FindResourceW
LoadResource
LockResource
Sleep
SizeofResource
GetModuleFileNameA
GetVersionExW
LoadLibraryW
TerminateProcess
SetErrorMode
SetUnhandledExceptionFilter
CreateMutexW
ReleaseMutex
FindNextFileW
DeleteFileW
GetFileAttributesW
SetFileAttributesW
CreateFileW
CreateFileA
FindClose
ReadFile
WriteFile
GetFileSize
GetCurrentProcess
WaitForSingleObject
CreateDirectoryW
GetTickCount
InitializeCriticalSection
MoveFileW
WideCharToMultiByte
VirtualQuery
LoadLibraryExW
lstrcmpiW
InterlockedIncrement
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
FreeResource
InterlockedDecrement
GetDriveTypeW
GetThreadTimes
FindResourceExW
QueryDosDeviceW
DeleteCriticalSection
GetModuleHandleW
GetProcessHeap
GetCurrentProcessId
LocalFree
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
CloseHandle
HeapReAlloc
Process32FirstW
Process32NextW
GetLastError
CreateToolhelp32Snapshot
GetLogicalDriveStringsW
HeapSize
OpenProcess
LocalAlloc
InitializeCriticalSectionAndSpinCount
VirtualAlloc
VirtualFree
HeapFree
DuplicateHandle
user32
GetKeyboardLayout
SetForegroundWindow
GetGUIThreadInfo
GetMessageW
DispatchMessageW
PeekMessageW
CharNextW
TranslateMessage
MessageBoxW
SendMessageW
GetActiveWindow
ActivateKeyboardLayout
GetKeyNameTextW
PostQuitMessage
InvalidateRgn
CreateAcceleratorTableW
DrawTextA
MapVirtualKeyExW
PostMessageW
DefWindowProcW
RegisterClassExW
CreateWindowExW
DestroyWindow
SetTimer
KillTimer
GetCursor
UpdateWindow
GetDC
ReleaseDC
IsWindow
SetWindowPos
IsWindowVisible
IsIconic
IsZoomed
SetFocus
GetFocus
GetKeyState
SetCapture
ReleaseCapture
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
GetClientRect
GetWindowRect
GetCursorPos
ScreenToClient
MapWindowPoints
GetSysColor
IntersectRect
UnionRect
OffsetRect
IsRectEmpty
PtInRect
GetWindowLongW
SetWindowLongW
GetParent
GetWindow
LoadImageW
MonitorFromWindow
GetMonitorInfoW
SetCursor
InflateRect
LoadCursorW
SetWindowRgn
wsprintfW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
EqualRect
PrivateExtractIconsW
DestroyIcon
DrawIconEx
wsprintfA
IsWindowEnabled
ClientToScreen
GetCaretPos
SetCaretPos
ShowCaret
HideCaret
GetCaretBlinkTime
CreateCaret
CallWindowProcW
RegisterClassW
GetClassInfoExW
ShowWindow
EnableWindow
GetSystemMetrics
TrackPopupMenu
AppendMenuW
SetPropW
GetPropW
UpdateLayeredWindow
MoveWindow
GetWindowRgn
CharPrevW
DrawTextW
FillRect
SetRect
CreatePopupMenu
DestroyMenu
EnableMenuItem
gdi32
ExtSelectClipRgn
SelectClipRgn
LineTo
GetTextExtentPoint32W
GetClipBox
GetCharABCWidthsW
CreateSolidBrush
CreateRectRgnIndirect
CreatePenIndirect
CombineRgn
CreateDIBSection
PtInRegion
CreateRectRgn
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
PlayEnhMetaFile
SetBkColor
CreateEnhMetaFileW
CloseEnhMetaFile
SelectObject
SaveDC
RestoreDC
Rectangle
RemoveFontMemResourceEx
AddFontMemResourceEx
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateDIBitmap
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetDeviceCaps
SetBkMode
StretchBlt
SetStretchBltMode
SetTextColor
GetObjectA
MoveToEx
TextOutW
GdiFlush
CreatePatternBrush
GetTextExtentPointA
GetBitmapBits
GetEnhMetaFileHeader
SetBitmapBits
advapi32
RegOpenKeyExW
AllocateAndInitializeSid
GetTokenInformation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
OpenProcessToken
RegQueryValueExW
GetUserNameW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegDeleteValueW
RegSetValueExW
LookupAccountSidW
FreeSid
shell32
DragQueryFileW
SHGetFileInfoW
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
CommandLineToArgvW
SHGetPathFromIDListW
SHBrowseForFolderW
ole32
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
ReleaseStgMedium
OleDuplicateData
DoDragDrop
CoInitialize
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
RegisterDragDrop
oleaut32
SysFreeString
VarUI4FromStr
VariantClear
VariantInit
SysAllocString
shlwapi
SHSetValueW
PathRemoveExtensionW
PathRemoveFileSpecW
PathIsDirectoryW
PathFileExistsW
PathFindFileNameW
comctl32
_TrackMouseEvent
InitCommonControlsEx
ord17
gdiplus
GdipRotateWorldTransform
GdipDrawImageRectI
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipTranslateWorldTransform
GdiplusStartup
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipSetStringFormatTrimming
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipCloneStringFormat
GdipDeleteStringFormat
GdipStringFormatGetGenericTypographic
GdipMeasureString
GdipImageSelectActiveFrame
GdipDeleteFont
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipFillPath
GdipFillRectangleI
GdipDrawPath
GdipDrawRectangleI
GdipSetInterpolationMode
GdipSetTextRenderingHint
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipDisposeImage
GdipCloneImage
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipSetPenMode
GdipDeletePen
GdipCreatePen1
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
ord1
GdipAddPathLine
GdipDeletePath
GdipCreatePath
GdipFree
GdipAlloc
GdiplusShutdown
GdipDrawString
imm32
ImmGetContext
ImmSetCompositionWindow
ImmReleaseContext
psapi
GetModuleFileNameExW
GetProcessImageFileNameW
EnumProcesses
EnumProcessModules
crypt32
CryptMsgClose
CertCloseStore
CryptMsgGetParam
CertFindCertificateInStore
CertFreeCertificateContext
CryptQueryObject
CertGetNameStringW
dbghelp
MiniDumpWriteDump
winhttp
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpCrackUrl
WinHttpOpen
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpSetTimeouts
WinHttpSetOption
WinHttpQueryDataAvailable
WinHttpWriteData
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
ws2_32
gethostname
gethostbyname
WSAStartup
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 197KB - Virtual size: 197KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 114KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE