Static task
static1
Behavioral task
behavioral1
Sample
b02b8c4bb367a63c3dda1440b1f1db2369b1abc5f071331768bbd45a2df559a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b02b8c4bb367a63c3dda1440b1f1db2369b1abc5f071331768bbd45a2df559a2.exe
Resource
win10v2004-20240412-en
General
-
Target
b02b8c4bb367a63c3dda1440b1f1db2369b1abc5f071331768bbd45a2df559a2
-
Size
5.0MB
-
MD5
3a9fd6fa638b208e5791bf37095f2841
-
SHA1
7e05cc04c4022d833ccadd39402c8537f380801b
-
SHA256
b02b8c4bb367a63c3dda1440b1f1db2369b1abc5f071331768bbd45a2df559a2
-
SHA512
294256b04608a77503df297be03825a1a394883093e826777ee509da6c29a9b35f1ee85cf16508fba71ffceb7e4b05087c418f746223ab2097f60f9bf8a0b2f0
-
SSDEEP
98304:Gd66tuq2eS9zviquFxqE+w9/yQNRYx8GXaJbx1jwN1tWf+OvJf71gO:OcqtoviXFxqDw0QE/fevJf71gO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b02b8c4bb367a63c3dda1440b1f1db2369b1abc5f071331768bbd45a2df559a2
Files
-
b02b8c4bb367a63c3dda1440b1f1db2369b1abc5f071331768bbd45a2df559a2.exe windows:5 windows x86 arch:x86
932fd2a4b88ac3f74bc4d17d9064bd41
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundW
imm32
ImmGetDefaultIMEWnd
ImmReleaseContext
ImmAssociateContext
ImmGetCompositionStringW
ImmSetCompositionFontW
ImmNotifyIME
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmGetContext
mpr
WNetCloseEnum
comctl32
InitCommonControlsEx
kernel32
GetTimeZoneInformation
GetUserDefaultLangID
GetUserDefaultLCID
GetVersionExA
GetVersionExW
GetVolumeInformationA
GetVolumeInformationW
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalSize
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsValidCodePage
IsValidLocale
LCMapStringA
LCMapStringW
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFileTimeToFileTime
LocalFree
lstrcmpiA
lstrcmpW
lstrlenA
lstrlenW
MapViewOfFile
MoveFileA
MoveFileW
MultiByteToWideChar
GetSystemDirectoryW
OpenProcess
OutputDebugStringW
PeekNamedPipe
PulseEvent
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryA
RemoveDirectoryW
ResetEvent
ResumeThread
SetCurrentDirectoryA
SetCurrentDirectoryW
SetEndOfFile
SetEnvironmentVariableA
SetEnvironmentVariableW
SetErrorMode
SetEvent
SetFileAttributesA
SetFileAttributesW
SetFileTime
SetHandleCount
SetHandleInformation
SetLastError
SetNamedPipeHandleState
SetPriorityClass
SetProcessAffinityMask
SetStdHandle
SetSystemTime
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObjectEx
WideCharToMultiByte
WriteFile
WriteProcessMemory
Process32FirstW
Process32NextW
GetSystemDirectoryA
GetStringTypeW
GetStringTypeA
GetStdHandle
GetStartupInfoA
GetTimeFormatW
GetProfileStringW
GetProcessHeap
GetProcessAffinityMask
GetProcAddress
GetPriorityClass
GetOverlappedResult
GetOEMCP
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLongPathNameW
GetLogicalDrives
GetLocalTime
GetLocaleInfoW
GetLocaleInfoA
GetLastError
GetFullPathNameW
GetFullPathNameA
GetFileType
GetFileSize
GetFileInformationByHandle
GetFileAttributesW
GetFileAttributesExW
GetExitCodeThread
GetExitCodeProcess
GetEnvironmentVariableW
GetEnvironmentVariableA
GetEnvironmentStringsW
GetDriveTypeW
GetDriveTypeA
GetDiskFreeSpaceW
GetDiskFreeSpaceExW
GetDiskFreeSpaceA
GetDateFormatW
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrencyFormatW
GetCPInfo
GetCommandLineW
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageW
FormatMessageA
FlushFileBuffers
FindNextFileW
FindNextFileA
FindNextChangeNotification
FindFirstFileW
FindFirstFileA
FindFirstChangeNotificationW
FindCloseChangeNotification
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FatalAppExitA
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
ExitThread
ExitProcess
EnumSystemLocalesA
DuplicateHandle
DisconnectNamedPipe
DeviceIoControl
DeleteFileW
DeleteFileA
DeleteCriticalSection
DefineDosDeviceA
CreateThread
CreateSemaphoreW
CreateSemaphoreA
CreateProcessW
CreateProcessA
CreatePipe
CreateNamedPipeA
CreateMutexW
CreateMutexA
CreateFileW
CreateFileMappingW
CreateFileMappingA
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryW
CreateDirectoryA
CopyFileW
CopyFileA
ConnectNamedPipe
CompareStringW
CompareStringA
CloseHandle
CancelIo
CallNamedPipeA
BackupWrite
BackupSeek
GetStartupInfoW
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
LoadLibraryA
GetTimeFormatA
GetThreadSelectorEntry
GetThreadPriority
GetThreadContext
GetTempPathW
GetTempPathA
GetSystemTimeAsFileTime
GetSystemTime
GetShortPathNameA
GetSystemInfo
OpenFileMappingW
user32
UnregisterClassW
UnhookWindowsHookEx
TranslateMessage
TrackPopupMenuEx
ToUnicode
ToAscii
SystemParametersInfoW
ShowWindow
SetWindowTextW
SetWindowTextA
SetWindowsHookExW
SetWindowRgn
SetWindowPos
SetWindowPlacement
SetWindowLongW
SetTimer
SetParent
SetMenuItemInfoW
SetForegroundWindow
SetFocus
SetDoubleClickTime
SetCursorPos
SetClipboardViewer
SetClipboardData
SetClassLongW
SetCaretPos
SetCaretBlinkTime
SetCapture
SendMessageW
SendMessageTimeoutW
SendMessageA
ScrollWindowEx
ScreenToClient
ReleaseDC
ReleaseCapture
RegisterWindowMessageW
RegisterWindowMessageA
RegisterClipboardFormatW
RegisterClassW
RegisterClassExW
PostThreadMessageW
PostMessageW
PeekMessageW
OpenClipboard
MsgWaitForMultipleObjectsEx
MoveWindow
MessageBoxW
MessageBoxA
MessageBeep
MapWindowPoints
MapVirtualKeyW
MapDialogRect
LoadImageW
LoadIconW
KillTimer
IsZoomed
IsWindowVisible
IsIconic
IsChild
InvalidateRgn
InvalidateRect
HideCaret
GetWindowThreadProcessId
GetWindowTextA
UpdateWindow
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindowDC
GetUserObjectInformationW
GetUpdateRect
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetQueueStatus
GetProcessWindowStation
GetParent
GetMessageW
GetMenu
GetKeyState
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetIconInfo
GetFocus
GetDoubleClickTime
GetDlgItem
GetDesktopWindow
GetDC
GetCursorPos
GetClipboardFormatNameW
GetClientRect
GetClassNameA
GetClassLongW
GetClassInfoW
GetCaretBlinkTime
GetAsyncKeyState
FindWindowW
FindWindowExW
ExitWindowsEx
EnumWindows
EnumDisplaySettingsW
EnumChildWindows
EndDialog
EnableMenuItem
EmptyClipboard
DrawTextW
DrawTextA
DrawIconEx
DispatchMessageW
DialogBoxIndirectParamW
DestroyIcon
DestroyCursor
DestroyCaret
DefWindowProcW
CreateWindowExW
CreateIconIndirect
CreateCursor
CreateCaret
CloseClipboard
ClipCursor
ClientToScreen
CharUpperBuffW
CharUpperBuffA
CharNextExA
CharLowerBuffW
CharLowerBuffA
ChangeDisplaySettingsW
ChangeClipboardChain
CountClipboardFormats
ValidateRgn
WindowFromPoint
wsprintfA
GetWindowRgn
RegisterClipboardFormatA
GetActiveWindow
GetPriorityClipboardFormat
DestroyWindow
gdi32
CreateFontIndirectW
CreatePalette
CreatePen
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
EndPage
StretchBlt
StartPage
SetWorldTransform
SetTextColor
SetTextAlign
SetPolyFillMode
SetGraphicsMode
SetBkMode
SelectPalette
SelectObject
SelectClipRgn
SelectClipPath
CreateEllipticRgn
RestoreDC
ResetDCW
RealizePalette
PtInRegion
PolyBezierTo
OffsetRgn
MoveToEx
LineTo
GetTextMetricsW
GetTextFaceW
GetTextExtentPoint32W
GetStockObject
GetRegionData
GetPaletteEntries
GetOutlineTextMetricsW
GetObjectW
GetObjectA
CreateDCW
GetNearestPaletteIndex
GetGlyphOutlineW
GetFontData
SaveDC
CreateDIBSection
CombineRgn
BeginPath
GetDIBits
GetDeviceCaps
GetCharABCWidthsW
GetCharABCWidthsFloatW
GetBkMode
GdiFlush
FillPath
ExtTextOutW
ExtCreatePen
EnumFontFamiliesExW
BitBlt
CloseFigure
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
EndPath
winspool.drv
EnumPrintersW
GetPrinterW
ClosePrinter
EnumFormsW
DeviceCapabilitiesW
OpenPrinterW
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
CloseServiceHandle
StartServiceW
StartServiceCtrlDispatcherW
SetServiceStatus
SetSecurityDescriptorDacl
SetFileSecurityW
RevertToSelf
ReportEventW
ReportEventA
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyExA
RegisterServiceCtrlHandlerW
RegisterEventSourceW
RegisterEventSourceA
RegFlushKey
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteValueA
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyExA
RegConnectRegistryW
RegConnectRegistryA
RegCloseKey
QueryServiceStatus
QueryServiceConfigW
QueryServiceConfigA
PrivilegeCheck
OpenThreadToken
OpenServiceW
OpenServiceA
OpenSCManagerW
OpenSCManagerA
OpenProcessToken
LookupPrivilegeValueA
LookupAccountSidW
LookupAccountSidA
LogonUserW
InitiateSystemShutdownA
InitializeSecurityDescriptor
ImpersonateNamedPipeClient
ImpersonateLoggedOnUser
GetUserNameW
GetUserNameA
GetTokenInformation
GetLengthSid
FreeSid
EqualSid
DuplicateToken
DeregisterEventSource
DeleteService
CreateServiceW
CreateServiceA
CopySid
AdjustTokenPrivileges
AllocateAndInitializeSid
ChangeServiceConfigW
ControlService
shell32
ShellExecuteW
ExtractIconExA
CommandLineToArgvW
SHGetFileInfoW
ole32
StringFromGUID2
OleUninitialize
RevokeDragDrop
CoCreateInstance
CoCreateGuid
RegisterDragDrop
ReleaseStgMedium
CoGetMalloc
OleSetClipboard
OleIsCurrentClipboard
OleInitialize
OleGetClipboard
OleFlushClipboard
CoUninitialize
DoDragDrop
CoLockObjectExternal
CoTaskMemFree
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__getmainargs
_acmdln
_except_handler3
exit
_XcptFilter
_exit
_initterm
_controlfp
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mpeg4 Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE