Static task
static1
Behavioral task
behavioral1
Sample
cbf3cdf7b0c30ebb7d823625f52485ce58ef01cd1a976688409486ea17a98361.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cbf3cdf7b0c30ebb7d823625f52485ce58ef01cd1a976688409486ea17a98361.exe
Resource
win10v2004-20240412-en
General
-
Target
cbf3cdf7b0c30ebb7d823625f52485ce58ef01cd1a976688409486ea17a98361
-
Size
786KB
-
MD5
f49b52f41563d97a35bdbcbb1977aef0
-
SHA1
3ed58b8785fa19bbace5d17b58c5f6b22e1d9b75
-
SHA256
cbf3cdf7b0c30ebb7d823625f52485ce58ef01cd1a976688409486ea17a98361
-
SHA512
735c67de17e6114fb7b82b105f90277de7ffe6d8dd303b859c7f2a635bce9b3ef1cbba9fb7e62ea3e7176f581c683713f712032c6ad0585600c67b63d2b8faf2
-
SSDEEP
12288:ECrHGuPxnXLEMSFsUw+zRtwOVqvFMupT9qLpdZCZV:sqnXrSFs4zRtwOVqvFDxopM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cbf3cdf7b0c30ebb7d823625f52485ce58ef01cd1a976688409486ea17a98361
Files
-
cbf3cdf7b0c30ebb7d823625f52485ce58ef01cd1a976688409486ea17a98361.exe windows:4 windows x86 arch:x86
e7efa93a7386d02d26424aadfc31488a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
ioctlsocket
gethostname
inet_addr
WSAStartup
recv
__WSAFDIsSet
send
WSAGetLastError
getsockname
getpeername
select
accept
listen
gethostbyname
connect
inet_ntoa
htons
htonl
bind
shutdown
closesocket
socket
setsockopt
WSACleanup
kernel32
GetVersionExA
GlobalUnlock
GlobalLock
GlobalAlloc
LockResource
LoadResource
SizeofResource
FindResourceA
CreateMutexA
OpenProcess
CreateProcessA
GetModuleFileNameA
Sleep
SetProcessShutdownParameters
WideCharToMultiByte
HeapSize
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
SetLastError
ExitThread
CreateThread
GetVersion
GetCommandLineA
GetStartupInfoA
GlobalDeleteAtom
TerminateProcess
ExitProcess
RaiseException
InterlockedIncrement
InterlockedDecrement
GetLocalTime
GetTimeZoneInformation
HeapFree
HeapAlloc
RtlUnwind
InterlockedExchange
TlsGetValue
ResumeThread
TlsAlloc
GetCurrentProcess
GetCurrentThread
DuplicateHandle
TlsSetValue
SetThreadPriority
CreateSemaphoreA
ReleaseSemaphore
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GlobalAddAtomA
GetSystemTime
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
SetHandleCount
SystemTimeToFileTime
ReadFile
GetComputerNameA
SetErrorMode
GetLogicalDriveStringsA
FindFirstFileA
FindNextFileA
FindClose
SetFileTime
CreateDirectoryA
GetCurrentThreadId
UnmapViewOfFile
GetCurrentProcessId
OutputDebugStringA
GetStdHandle
WriteConsoleA
WriteFile
CloseHandle
DeleteFileA
MoveFileA
CreateFileA
SetFilePointer
SetEndOfFile
AllocConsole
FreeLibrary
LoadLibraryA
GetLastError
GetProcAddress
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
GetCPInfo
FlushFileBuffers
GetACP
GetOEMCP
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetStdHandle
GetModuleHandleA
user32
LoadIconA
DestroyMenu
EnableMenuItem
GetMenuItemID
TrackPopupMenu
SetMenuDefaultItem
GetSubMenu
CheckMenuItem
GetMenuState
MapWindowPoints
CreateDialogParamA
ExitWindowsEx
GetUserObjectInformationA
GetProcessWindowStation
IsIconic
GetWindow
PostThreadMessageA
TranslateMessage
GetMessageA
GetAsyncKeyState
MapVirtualKeyA
GetClipboardOwner
GetClipboardData
PostQuitMessage
EnumWindows
GetPropA
IsWindowVisible
SetPropA
RemovePropA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
DrawIconEx
GetIconInfo
LoadMenuA
ChangeDisplaySettingsA
OpenDesktopA
EnumDesktopWindows
SystemParametersInfoA
FindWindowA
KillTimer
PeekMessageA
WaitMessage
DispatchMessageA
RegisterWindowMessageA
GetCursorPos
IntersectRect
mouse_event
GetKeyboardState
keybd_event
SetTimer
GetForegroundWindow
GetWindowThreadProcessId
SetActiveWindow
MessageBeep
FlashWindow
EndDialog
DialogBoxParamA
SetForegroundWindow
EnumDisplaySettingsA
GetThreadDesktop
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetDC
GetWindowTextA
GetClassNameA
GetWindowDC
ReleaseDC
LoadImageA
DestroyCursor
CallWindowProcA
SetClipboardViewer
VkKeyScanA
GetParent
WindowFromPoint
IsChild
GetSystemMetrics
LoadBitmapA
SetWindowTextA
GetDesktopWindow
EqualRect
IsRectEmpty
GetWindowPlacement
SetWindowRgn
InflateRect
PtInRect
GetWindowRgn
InvalidateRgn
ShowWindow
GetWindowLongA
GetCapture
ClientToScreen
GetWindowRect
SetWindowPos
UpdateWindow
LoadCursorA
SetCursor
BeginPaint
OffsetRect
FillRect
SetRect
EndPaint
SetCapture
ClipCursor
PostMessageA
DefWindowProcA
ReleaseCapture
DestroyWindow
RegisterClassExA
CreateWindowExA
SetWindowLongA
GetDlgItemTextA
SetDlgItemInt
MessageBoxA
GetDlgItemInt
SetDlgItemTextA
GetFocus
SetFocus
SendMessageA
SendDlgItemMessageA
GetDlgItem
EnableWindow
ChangeClipboardChain
gdi32
GetRegionData
GetObjectA
GetBitmapBits
GdiFlush
SelectObject
BitBlt
CreateDIBSection
GetStockObject
CreatePalette
SelectPalette
RealizePalette
CreateCompatibleDC
GetDeviceCaps
CreateCompatibleBitmap
GetDIBits
CreateDCA
ExtEscape
DeleteDC
GetSystemPaletteEntries
SetROP2
FrameRgn
CreateRectRgnIndirect
CombineRgn
CreateRectRgn
CreateHatchBrush
DeleteObject
CreateSolidBrush
advapi32
RegCloseKey
RegSetValueExA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
SetServiceStatus
RegOpenKeyA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
GetUserNameA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegCreateKeyA
shell32
Shell_NotifyIconA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
comctl32
ord17
Sections
.text Size: 240KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 224KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ