Static task
static1
Behavioral task
behavioral1
Sample
cf1685d9acb63eae40c763f332bacec9f4d2950af6e1fbdf0a701531c2989840.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cf1685d9acb63eae40c763f332bacec9f4d2950af6e1fbdf0a701531c2989840.exe
Resource
win10v2004-20240412-en
General
-
Target
cf1685d9acb63eae40c763f332bacec9f4d2950af6e1fbdf0a701531c2989840
-
Size
7.1MB
-
MD5
24d1799c14979b96d5640feeeee45a0b
-
SHA1
eb9e214f39c80517a52117652b7fa9325c78379c
-
SHA256
cf1685d9acb63eae40c763f332bacec9f4d2950af6e1fbdf0a701531c2989840
-
SHA512
530a9acb0a264f82918f9445f2b47b79488abc6528d642763fa3e453f0b3e019e3d79007abf676a4a0a2fcfbe7e0cb16200e7f1321bc3353fa90ade12e9e1c6a
-
SSDEEP
98304:amlNlG4YQi53p3TcpmDt5Dd5vwZaOgYJdVFMof0ZhkXctoGlAMz8DqTD+UaEtqGn:63tApK/DzwZaOgCFMwlEtvuIq2
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf1685d9acb63eae40c763f332bacec9f4d2950af6e1fbdf0a701531c2989840
Files
-
cf1685d9acb63eae40c763f332bacec9f4d2950af6e1fbdf0a701531c2989840.exe windows:4 windows x86 arch:x86
4d7dd11f06aa8f7b841e7435d6b170f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiOutPrepareHeader
midiOutReset
PlaySoundA
waveOutUnprepareHeader
waveOutPrepareHeader
waveOutWrite
waveOutPause
waveOutReset
waveOutClose
midiStreamStop
midiStreamRestart
midiStreamClose
midiStreamOut
midiStreamProperty
midiStreamOpen
midiOutUnprepareHeader
waveOutOpen
waveOutGetNumDevs
ws2_32
inet_ntoa
WSACleanup
select
closesocket
WSAAsyncSelect
recvfrom
ioctlsocket
recv
getpeername
accept
send
WSAStartup
rasapi32
RasGetConnectStatusA
RasHangUpA
msvfw32
DrawDibDraw
avifil32
AVIStreamInfoA
AVIStreamGetFrame
kernel32
GetVersion
IsDBCSLeadByte
lstrcmpA
lstrcmpiA
lstrcpynA
FileTimeToLocalFileTime
GetFileType
DuplicateHandle
SystemTimeToFileTime
GetLocalTime
DosDateTimeToFileTime
SetFileTime
InterlockedIncrement
InterlockedDecrement
LocalFree
FormatMessageA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetThreadLocale
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
TlsSetValue
LocalReAlloc
TlsGetValue
GetFileTime
GetCurrentThread
GlobalFlags
SetErrorMode
GetProcessVersion
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
RaiseException
GetSystemTime
HeapSize
GetACP
SetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
GetTimeZoneInformation
SetLastError
OpenProcess
TerminateProcess
GetFileSize
SetFilePointer
CreateToolhelp32Snapshot
Process32First
Process32Next
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
Beep
GetWindowsDirectoryA
LoadLibraryExA
CreateSemaphoreA
ResumeThread
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
GetProfileStringA
WriteFile
ReadFile
GetLastError
WaitForMultipleObjects
CreateFileA
SetEvent
FindResourceA
LoadResource
LockResource
RemoveDirectoryA
GetModuleFileNameA
GetCurrentThreadId
ExitProcess
GlobalSize
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
lstrcatA
WinExec
lstrcpyA
FindNextFileA
GlobalReAlloc
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
GetFullPathNameA
FreeLibrary
LoadLibraryA
lstrlenA
GetVersionExA
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateThread
CreateEventA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
FindFirstFileA
FindClose
SetFileAttributesA
GetFileAttributesA
DeleteFileA
CreateDirectoryA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetVolumeInformationA
GetModuleHandleA
GetProcAddress
MulDiv
GetCommandLineA
GetTickCount
CreateProcessA
WaitForSingleObject
CloseHandle
InterlockedExchange
FileTimeToSystemTime
user32
GetSysColorBrush
GetNextDlgGroupItem
PostThreadMessageA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
CheckMenuItem
MoveWindow
IsDialogMessageA
ScrollWindowEx
SendDlgItemMessageA
MapWindowPoints
AdjustWindowRectEx
GetScrollPos
RegisterClassA
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetLastActivePopup
RegisterWindowMessageA
GetWindowPlacement
EndDialog
CreateDialogIndirectParamA
DestroyWindow
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
GetWindowTextLengthA
GetNextDlgTabItem
CharUpperA
UnregisterClassA
FindWindowExA
GetDlgItem
FindWindowA
GetWindowThreadProcessId
GetDesktopWindow
GetForegroundWindow
CreateIconIndirect
GetIconInfo
CopyIcon
LoadStringA
SetWindowTextA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetMenuItemCount
GetMenuItemID
GetMenuState
GetWindowTextA
GetClassNameA
SystemParametersInfoA
TranslateMessage
LoadIconA
DrawFrameControl
DrawEdge
DrawFocusRect
GetMessageA
DispatchMessageA
SetRectEmpty
RegisterClipboardFormatA
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
CreatePopupMenu
AppendMenuA
ModifyMenuA
CreateMenu
CreateAcceleratorTableA
GetDlgCtrlID
GetSubMenu
EnableMenuItem
ClientToScreen
EnumDisplaySettingsA
LoadImageA
ShowWindow
IsWindowEnabled
TranslateAcceleratorA
GetKeyState
CopyAcceleratorTableA
PostQuitMessage
IsZoomed
GetSystemMenu
DeleteMenu
GetClassInfoA
DefWindowProcA
GetMenu
SetMenu
PeekMessageA
IsIconic
SetFocus
GetActiveWindow
GetWindow
DestroyAcceleratorTable
SetWindowRgn
GetMessagePos
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
WinHelpA
KillTimer
SetTimer
GetCapture
SetCapture
GetScrollRange
SetScrollRange
SetScrollPos
InflateRect
SetRect
IntersectRect
DestroyIcon
PtInRect
OffsetRect
IsWindowVisible
EnableWindow
RedrawWindow
GetWindowLongA
SetWindowLongA
GetSysColor
SetActiveWindow
SetCursorPos
LoadCursorA
SetCursor
GetDC
FillRect
IsRectEmpty
ReleaseDC
IsChild
DestroyMenu
SetForegroundWindow
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
GetFocus
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBeep
MessageBoxA
GetCursorPos
GetSystemMetrics
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
WaitForInputIdle
MapDialogRect
SetWindowContextHelpId
CharNextA
WindowFromPoint
ReleaseCapture
gdi32
GetROP2
GetBkColor
GetBkMode
GetTextColor
CreateRoundRectRgn
CreateEllipticRgn
PathToRegion
EndPath
BeginPath
GetWindowOrgEx
GetViewportOrgEx
GetStretchBltMode
GetPolyFillMode
GetWindowExtEx
CreateCompatibleBitmap
CreateDCA
CreateBitmap
CreatePatternBrush
GetDIBits
SelectObject
GetObjectA
CreatePen
RealizePalette
PatBlt
SaveDC
RestoreDC
SetPolyFillMode
SetROP2
FillRgn
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
CreateRectRgn
GetClipBox
ExcludeClipRect
ExtSelectClipRgn
GetViewportExtEx
PtVisible
RectVisible
ExtTextOutA
Escape
GetMapMode
MoveToEx
LineTo
SetTextColor
GetTextMetricsA
OffsetRgn
FrameRgn
SetBkColor
CreateRectRgnIndirect
CreateDIBSection
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
DeleteObject
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
StretchBlt
SelectPalette
CombineRgn
CreateSolidBrush
GetStockObject
CreateFontIndirectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
BitBlt
CreateCompatibleDC
ScaleWindowExtEx
SetDIBitsToDevice
SetBkMode
TextOutA
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
GetTextExtentPoint32A
SetMapMode
GetDeviceCaps
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comdlg32
GetFileTitleA
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
advapi32
RegCreateKeyExA
RegQueryValueA
RegCreateKeyA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHBrowseForFolderA
ShellExecuteA
Shell_NotifyIconA
SHGetMalloc
SHGetPathFromIDListA
ole32
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
OleInitialize
OleUninitialize
CLSIDFromString
oleaut32
SafeArrayGetLBound
SafeArrayGetUBound
VariantChangeType
VariantClear
SafeArrayGetDim
SafeArrayUnaccessData
SafeArrayAccessData
VariantTimeToSystemTime
SysStringLen
SysAllocString
SafeArrayCreate
VariantCopy
SysAllocStringLen
UnRegisterTypeLi
RegisterTypeLi
OleCreateFontIndirect
SysFreeString
SafeArrayGetElemsize
SysAllocStringByteLen
LoadTypeLi
comctl32
ord17
ImageList_Destroy
ImageList_Read
ImageList_Duplicate
ImageList_GetIcon
ImageList_GetImageInfo
ImageList_GetImageCount
_TrackMouseEvent
oledlg
ord8
wininet
InternetSetOptionA
InternetOpenA
InternetConnectA
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 824KB - Virtual size: 822KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6.2MB - Virtual size: 6.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ