Static task
static1
Behavioral task
behavioral1
Sample
1511a6ee36b1e4c6b1b2ede3c66489fc6c23029433e4b4f735b4ccbe330bc912.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1511a6ee36b1e4c6b1b2ede3c66489fc6c23029433e4b4f735b4ccbe330bc912.exe
Resource
win10v2004-20240412-en
General
-
Target
1511a6ee36b1e4c6b1b2ede3c66489fc6c23029433e4b4f735b4ccbe330bc912
-
Size
848KB
-
MD5
26f70640e6c62828ee1854a9f9a338d0
-
SHA1
b0cffc130450c96a93bfde62051f632609d3e455
-
SHA256
1511a6ee36b1e4c6b1b2ede3c66489fc6c23029433e4b4f735b4ccbe330bc912
-
SHA512
06d05f80e7d8130ad1bda714ef35da3db343eee3c2d7397a6553b8bcbd514c18ffefb7c493906d1a64d953e7dd57f659d86cdb7f81cecfd472005b730e35313f
-
SSDEEP
6144:1COKRrqb0S382phM4Qv0/uY0M6ZXsLxwYI1vWRvDEtylN0CtNCBDnC4EsvK2Yx:sOKdqb0w9uY0M6J5WtDEAz0CP2Q2E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1511a6ee36b1e4c6b1b2ede3c66489fc6c23029433e4b4f735b4ccbe330bc912
Files
-
1511a6ee36b1e4c6b1b2ede3c66489fc6c23029433e4b4f735b4ccbe330bc912.exe windows:4 windows x86 arch:x86
52608302c8ca1b0674982ecb5549d862
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
meta_app
_METAAPP_writeIMEItoNVRAM_Ex3@24
_METAAPP_readIMEIfromNVRAM_Ex3@16
_METAAPP_readBarcodefromNVRAM@12
_METAAPP_GetTargetVerInfo@12
_METAAPP_writeBarcodetoNVRAM@12
meta_dll
ord1044
ord130
ord183
ord131
ord490
ord724
ord1704
ord198
ord26
ord1353
ord296
ord106
ord104
ord105
ord168
ord307
ord479
ord1092
ord1090
ord1193
ord1694
ord290
ord1376
ord1042
spbootmode
ord1017
ord1016
ord1020
spmeta_dll
ord2
ord4
ord202
ord50
ord48
ord5087
ord216
ord2882
ord5352
ord89
ord5123
ord5121
ord5117
ord5091
ord19
ord52
ord5011
ord206
ord208
ord5072
ord4106
ord4108
ord7
sp_meta_wrapper
ord20
ord46
ord44
ord40
ord28
ord16
ord18
kernel32
CreatePipe
WriteFile
ReadFile
WideCharToMultiByte
FormatMessageA
DuplicateHandle
GetCurrentProcess
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetProcAddress
LoadLibraryA
lstrcpyA
FindClose
FindFirstFileA
GetVolumeInformationA
lstrcpynA
GetFullPathNameA
GetThreadLocale
lstrcmpiA
SetLastError
FindNextFileA
GetStartupInfoA
FindResourceA
LockResource
GlobalFree
GlobalUnlock
GlobalLock
GetModuleHandleA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
lstrcatA
GetVersion
FreeLibrary
MulDiv
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCurrentThread
lstrcmpA
GlobalAlloc
ResumeThread
SetThreadPriority
SuspendThread
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetFileAttributesA
GetFileSize
GetFileTime
SetErrorMode
GlobalFlags
SizeofResource
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
GetTickCount
RtlUnwind
HeapFree
HeapAlloc
GetCommandLineA
ExitProcess
RaiseException
GetTimeZoneInformation
GetSystemTime
GetACP
TerminateProcess
CreateThread
ExitThread
HeapReAlloc
HeapSize
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
GetDriveTypeA
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
CreateProcessA
GetEnvironmentVariableA
SetEnvironmentVariableA
CreateEventA
ResetEvent
WaitForSingleObject
CreateFileA
CloseHandle
SetEvent
CreateDirectoryA
CopyFileA
GetPrivateProfileIntA
WritePrivateProfileStringA
Sleep
CreateMutexA
ReleaseMutex
GetPrivateProfileStringA
GetModuleFileNameA
GetLocalTime
InterlockedIncrement
lstrlenA
MultiByteToWideChar
GetLastError
InterlockedDecrement
LocalFree
GetProfileStringA
LoadResource
user32
SetRect
GetNextDlgGroupItem
MessageBeep
InvalidateRect
InflateRect
RegisterClipboardFormatA
PostThreadMessageA
SetDlgItemTextA
SetDlgItemInt
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetWindowDC
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
CopyAcceleratorTableA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
CharUpperA
wsprintfA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetTimer
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
KillTimer
GetKeyState
IsWindowVisible
GetFocus
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
GetMenu
RemoveMenu
LoadIconA
ReleaseDC
GetDC
ClientToScreen
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
EnableWindow
SendMessageA
IsWindowUnicode
CharNextA
GetSysColorBrush
LoadCursorA
GetDesktopWindow
PtInRect
GetClassNameA
DestroyMenu
LoadStringA
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
SetCursor
PostQuitMessage
wvsprintfA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
UnhookWindowsHookEx
BeginPaint
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
CreateWindowExA
DefWindowProcA
gdi32
GetStockObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
SelectObject
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
DPtoLP
LPtoDP
GetMapMode
PatBlt
BitBlt
GetTextExtentPointA
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateCompatibleDC
CreateDIBitmap
CreateSolidBrush
CreateFontA
GetBkColor
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
comctl32
ord17
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoUninitialize
OleRun
CoInitialize
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoCreateInstance
StgCreateDocfileOnILockBytes
olepro32
ord253
oleaut32
VariantInit
VariantCopy
SysAllocString
SysAllocStringByteLen
SysFreeString
VariantChangeType
SysAllocStringLen
VariantTimeToSystemTime
VariantClear
SysStringLen
SysStringByteLen
GetErrorInfo
ws2_32
gethostbyname
WSACleanup
inet_ntoa
gethostname
WSAStartup
Sections
.text Size: 408KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 284KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ