Static task
static1
Behavioral task
behavioral1
Sample
92c75df382218e7743359aa83b403e443550e766c8474a59c9dcbd4903a4bf02.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
92c75df382218e7743359aa83b403e443550e766c8474a59c9dcbd4903a4bf02.exe
Resource
win10v2004-20240226-en
General
-
Target
92c75df382218e7743359aa83b403e443550e766c8474a59c9dcbd4903a4bf02
-
Size
285KB
-
MD5
8503d2ba30440fe0d13bfca9940d94ff
-
SHA1
48a5836e51519f0521c26936a928650fa7f03362
-
SHA256
92c75df382218e7743359aa83b403e443550e766c8474a59c9dcbd4903a4bf02
-
SHA512
cf5b85280b2be71ce601e53bf0c2d2ff3c9cda885f7bf6e431daae19d241fa9df781fa05e343bb9deee0fce3b217e5fbd13664f9b6c9bdd59cc53695d024fb01
-
SSDEEP
6144:PRikKWXhffJe/MiUYq3RsmdlZZy6heNPCs:wnAJegYeRsQYmeUs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 92c75df382218e7743359aa83b403e443550e766c8474a59c9dcbd4903a4bf02
Files
-
92c75df382218e7743359aa83b403e443550e766c8474a59c9dcbd4903a4bf02.exe windows:5 windows x86 arch:x86
ce864f80d393a51310ffc3f7a24722c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetDriveTypeA
GetCommandLineA
GetStartupInfoA
HeapFree
VirtualQuery
RtlUnwind
HeapReAlloc
HeapSize
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetStdHandle
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
FileTimeToLocalFileTime
SetErrorMode
GetTickCount
GetOEMCP
GetCPInfo
GetModuleHandleW
CreateFileA
GetFullPathNameA
FindFirstFileA
FindClose
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GetCurrentDirectoryA
FileTimeToSystemTime
InterlockedIncrement
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
FormatMessageA
LocalFree
GlobalUnlock
GlobalFree
WritePrivateProfileStringA
GlobalAddAtomA
GetCurrentProcessId
SetLastError
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetModuleHandleA
RaiseException
MultiByteToWideChar
LockResource
SizeofResource
WideCharToMultiByte
LoadResource
FindResourceA
lstrcpyA
CreateThread
CloseHandle
VirtualProtect
GetModuleFileNameA
LoadLibraryA
VirtualAlloc
GetProcAddress
GetLastError
Sleep
GetProcessHeap
HeapAlloc
lstrlenA
HeapCreate
ExitProcess
user32
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
GetWindowPlacement
GetWindowRect
SystemParametersInfoA
DestroyMenu
CopyRect
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSysColor
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyWindow
IsWindow
GetDlgItem
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindow
SetWindowPos
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
RegisterWindowMessageA
PostMessageA
SetMenuItemBitmaps
EnableWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
IsIconic
GetClientRect
SendMessageA
GetSystemMetrics
RegisterClipboardFormatA
UnregisterClassA
ReleaseDC
LoadCursorA
GetSysColorBrush
ShowWindow
SetWindowTextA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetWindowTextA
GetForegroundWindow
GetTopWindow
gdi32
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
GetDeviceCaps
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
CreateBitmap
SaveDC
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ