Static task
static1
Behavioral task
behavioral1
Sample
0a45065cdc13bff7ccf937607acfb4ecd7f036035ee42edad8a203653923a4d1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a45065cdc13bff7ccf937607acfb4ecd7f036035ee42edad8a203653923a4d1.exe
Resource
win10v2004-20240226-en
General
-
Target
0a45065cdc13bff7ccf937607acfb4ecd7f036035ee42edad8a203653923a4d1
-
Size
396KB
-
MD5
700b3fcd6db74fd27e129c38a2e721a1
-
SHA1
da068dad4dfaef6bcf88519bf019678340c89707
-
SHA256
0a45065cdc13bff7ccf937607acfb4ecd7f036035ee42edad8a203653923a4d1
-
SHA512
470495d1816c234f10454bd6623594c4bd370b22ed93e0411b488f9f20837f134daacf711cf9e9f4005a9c0a050e596e7fd465328873a6666b0cf057ecf0b433
-
SSDEEP
6144:qtBwjFUDAZIGgohFmGqRGl9Kg2Z1pNT6Cm0P9vz9x2MexXcX8V:qtBwQmlQgzC5z9x23pcXu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a45065cdc13bff7ccf937607acfb4ecd7f036035ee42edad8a203653923a4d1
Files
-
0a45065cdc13bff7ccf937607acfb4ecd7f036035ee42edad8a203653923a4d1.exe windows:4 windows x86 arch:x86
3f504e8dfcdc590342073bb20246f5ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
persistfrm
?PreCreateWindow@CPersistentFrame@@MAEHAAUtagCREATESTRUCTA@@@Z
??0CPersistentFrame@@IAE@XZ
?classCPersistentFrame@CPersistentFrame@@2UCRuntimeClass@@B
?messageMap@CPersistentFrame@@1UAFX_MSGMAP@@B
?ActivateFrame@CPersistentFrame@@UAEXH@Z
??1CPersistentFrame@@MAE@XZ
diraces
ord4
ord1
ord5
ord2
ord3
upld
ord2
ord12
ord14
GetDeviceInfo
ord10
ndmac
ord2
ord3
ord16
ord4
mfc42
ord5265
ord4376
ord4998
ord2514
ord6052
ord1775
ord4407
ord5280
ord4425
ord3597
ord2582
ord6055
ord4078
ord1776
ord4402
ord5241
ord2385
ord5163
ord6374
ord4353
ord5290
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3370
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord3640
ord693
ord686
ord641
ord567
ord384
ord324
ord825
ord2302
ord4234
ord2818
ord3998
ord2862
ord535
ord4160
ord4284
ord5953
ord1146
ord1168
ord2096
ord2642
ord3996
ord4710
ord4853
ord802
ord6569
ord542
ord6905
ord1199
ord2765
ord860
ord2370
ord6215
ord6199
ord804
ord3097
ord3874
ord6453
ord2587
ord4406
ord3394
ord3729
ord5572
ord2915
ord823
ord2817
ord1768
ord2086
ord326
ord922
ord924
ord926
ord1200
ord4055
ord2864
ord1572
ord850
ord6195
ord3870
ord941
ord3317
ord1871
ord3663
ord2740
ord2801
ord3402
ord2135
ord818
ord2379
ord2688
ord6197
ord2380
ord2289
ord5981
ord6334
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord3571
ord616
ord323
ord2298
ord613
ord1641
ord1640
ord289
ord665
ord1979
ord5442
ord5186
ord354
ord2515
ord355
ord790
ord755
ord5785
ord6157
ord470
ord6385
ord5651
ord3127
ord3616
ord5583
ord350
ord3626
ord2414
ord3716
ord640
ord537
ord4299
ord6111
ord3089
ord4694
ord2763
ord2645
ord939
ord1737
ord1105
ord792
ord603
ord957
ord273
ord540
ord2029
ord2077
ord523
ord1567
ord268
ord773
ord501
ord1083
ord2776
ord536
ord3318
ord5607
ord6007
ord6515
ord4220
ord2584
ord3654
ord2438
ord2455
ord2863
ord1644
ord3910
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord5472
ord3403
ord2879
ord2878
ord4151
ord4077
ord5237
ord5282
ord2649
ord1665
ord4427
ord796
ord554
ord529
ord807
ord2494
ord2627
ord2626
ord6000
ord2117
ord4163
ord6625
ord4457
ord6069
ord2614
ord4436
ord2775
ord3286
ord2884
ord4615
ord4612
ord4610
ord1576
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5714
ord4622
ord3738
ord561
ord815
ord5710
ord5301
ord986
ord520
ord4159
ord6117
ord2621
ord1247
ord1134
ord4278
ord617
ord5214
ord296
ord5289
ord2725
ord1825
ord4238
ord4696
ord3058
ord3065
ord6336
ord2510
ord2542
ord5243
ord5740
ord1746
ord5577
ord3172
ord5653
ord4953
ord4858
ord4387
ord3454
ord3198
ord6080
ord6175
ord4623
ord4426
ord5823
ord3664
ord652
ord415
ord338
ord715
ord4823
ord4420
ord2399
ord5620
ord4614
ord4613
ord1849
ord4244
ord4588
ord4370
ord4892
ord4532
ord5076
ord4723
ord5253
ord3371
ord3641
ord2583
ord4589
ord4899
ord4341
ord4349
ord4890
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4964
ord4961
ord4108
ord4403
ord5240
ord3748
ord1726
ord4432
ord2841
ord303
ord813
ord2535
ord3797
ord1081
ord5605
ord2761
ord4224
ord6648
ord6270
ord4508
ord3293
ord5773
ord923
ord3302
ord2107
ord5450
ord5440
ord6383
ord6394
ord6743
ord6571
ord879
ord882
ord2297
ord2363
ord3742
ord4275
ord2152
ord1233
ord1175
ord1949
ord4034
ord800
ord3301
ord858
ord4204
ord541
ord3092
ord6143
ord6907
ord801
ord524
ord4274
msvcrt
??1type_info@@UAE@XZ
_except_handler3
?terminate@@YAXXZ
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
_purecall
__set_app_type
_controlfp
strncmp
strncpy
fwrite
fopen
fread
malloc
free
fclose
atoi
__CxxFrameHandler
_mbscmp
strtok
_access
exit
fscanf
fgets
strncat
fprintf
strchr
_CIpow
_ftol
__p__fmode
_setmbcp
_itoa
kernel32
Sleep
GetStartupInfoA
GetModuleHandleA
GetCurrentProcess
GetLastError
SetLastError
CloseHandle
CreateMutexA
LoadLibraryA
GetSystemDefaultLangID
GetModuleFileNameA
ResumeThread
DeleteFileA
user32
GetMenuState
EnableMenuItem
GetMenuItemCount
RemoveMenu
LoadMenuA
SetCursorPos
ClientToScreen
KillTimer
InvalidateRect
GetWindowRect
LoadCursorA
SetTimer
CheckMenuRadioItem
DeleteMenu
WinHelpA
IsIconic
GetWindowPlacement
SetWindowPlacement
GetCursorPos
ScreenToClient
GetSubMenu
AppendMenuA
GetMenu
SetForegroundWindow
PostMessageA
wsprintfA
UpdateWindow
CloseWindow
GetFocus
GetMenuStringA
SetCursor
EnableWindow
GetKeyState
LoadIconA
SendMessageA
LoadBitmapA
GetClientRect
WaitForInputIdle
FindWindowA
GetParent
gdi32
CreateCompatibleDC
GetObjectA
SetBitmapBits
CreateICA
GetDeviceCaps
GetBitmapBits
BitBlt
advapi32
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
comctl32
ImageList_ReplaceIcon
oleaut32
VariantClear
wsock32
ntohl
shutdown
htons
ntohs
WSAGetLastError
htonl
msvcp60
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?_Xlen@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ