Static task
static1
Behavioral task
behavioral1
Sample
355b43c5555eb161fdf6a97695dcd71689f0964e863893eb1f2c7fb17549189f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
355b43c5555eb161fdf6a97695dcd71689f0964e863893eb1f2c7fb17549189f.exe
Resource
win10v2004-20240412-en
General
-
Target
355b43c5555eb161fdf6a97695dcd71689f0964e863893eb1f2c7fb17549189f
-
Size
2.9MB
-
MD5
638bf9bbc79f4d1bd14ee0896c89593a
-
SHA1
196736747109eef3ef7fad8632da5f2a7b9de301
-
SHA256
355b43c5555eb161fdf6a97695dcd71689f0964e863893eb1f2c7fb17549189f
-
SHA512
71f936335d978620001f438fe06196ea12bcc1654e5298ee060c4d49535e075f72a0b7e7650d0521da3f659f4d41ec856eedd724d772539f2d0e2ce7cbe94c02
-
SSDEEP
24576:EZlncxPNa3NPlT7U8sGcy4Kl1QyDFT1X1buc7lfKAK7JMH37PZOToaUtVe39TFr5:EZln8PNa99T2rcHpMEX7PdaYVPQD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 355b43c5555eb161fdf6a97695dcd71689f0964e863893eb1f2c7fb17549189f
Files
-
355b43c5555eb161fdf6a97695dcd71689f0964e863893eb1f2c7fb17549189f.exe windows:4 windows x86 arch:x86
5b8e96f29c742cd51e4ddce79ff028c2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
toupper
tolower
strncmp
strlen
strchr
memset
memmove
memcpy
memcmp
malloc
isxdigit
isupper
isspace
ispunct
isprint
islower
_except_handler3
mpr
WNetGetConnectionA
comctl32
ImageList_DragMove
ord17
ImageList_Write
ImageList_SetIconSize
ImageList_SetDragCursorImage
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Replace
ImageList_Remove
ImageList_Read
ImageList_GetImageCount
ImageList_GetIconSize
ImageList_GetDragImage
ImageList_GetBkColor
ImageList_EndDrag
ImageList_DrawEx
ImageList_DragShowNolock
ImageList_DragLeave
version
VerQueryValueA
setupapi
SetupFindFirstLineW
SetupInitDefaultQueueCallbackEx
SetupInstallFilesFromInfSectionW
SetupInstallFromInfSectionW
SetupInstallServicesFromInfSectionW
SetupOpenAppendInfFileW
SetupPromptReboot
SetupTermDefaultQueueCallback
SetupGetStringFieldW
wininet
InternetReadFile
InternetOpenA
InternetConnectA
kernel32
GetFileType
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetLocalTime
GetLogicalDrives
GetFileTime
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetStdHandle
GetStringTypeExA
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetTimeZoneInformation
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalFree
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalUnlock
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LockResource
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
MoveFileA
MoveFileExA
MulDiv
MultiByteToWideChar
RaiseException
ReadFile
RemoveDirectoryA
ResetEvent
ResumeThread
SetCurrentDirectoryA
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
SetFileTime
SetThreadLocale
SetThreadPriority
SetVolumeLabelA
SizeofResource
SleepEx
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
WritePrivateProfileStringA
IsValidCodePage
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileSize
GetFileAttributesA
GetExitCodeThread
GetExitCodeProcess
GetDriveTypeA
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentDirectoryA
GetCPInfo
GetCommandLineA
GetACP
FreeResource
FreeLibrary
FormatMessageA
FlushFileBuffers
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsA
ExitThread
EnumCalendarInfoA
DosDateTimeToFileTime
DeviceIoControl
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessA
CreateMutexA
GetTickCount
LeaveCriticalSection
GetStartupInfoA
EnterCriticalSection
InitializeCriticalSection
ExitProcess
GetLogicalDriveStringsA
user32
PeekMessageA
PostMessageA
PostQuitMessage
PtInRect
RedrawWindow
RegisterClassA
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropA
ScreenToClient
ScrollWindow
SendMessageA
SetActiveWindow
SetCapture
SetClassLongA
SetClipboardData
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemInfoA
SetPropA
SetRect
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowsHookExA
SetWindowTextA
ShowCursor
ShowOwnedPopups
ShowScrollBar
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UpdateWindow
ValidateRect
WaitMessage
WindowFromDC
WindowFromPoint
WinHelpA
GetSystemMetrics
GetSystemMenu
GetSysColor
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetParent
GetMessagePos
LoadImageA
GetMenuState
OpenClipboard
GetMenuItemID
GetMenuItemCount
GetLastActivePopup
GetKeyState
GetKeyNameTextA
GetKeyboardType
GetKeyboardState
GetKeyboardLayoutList
GetIconInfo
GetForegroundWindow
GetFocus
GetDlgItem
GetDesktopWindow
GetDCEx
GetCursorPos
GetClipboardData
GetClientRect
GetClassNameA
GetClassInfoA
GetCapture
FrameRect
FindWindowA
FillRect
ExitWindowsEx
EqualRect
EnumWindows
EnumThreadWindows
EnableWindow
EnableScrollBar
EnableMenuItem
EmptyClipboard
DrawTextA
DrawMenuBar
DrawIconEx
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyCursor
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreateWindowExA
CreatePopupMenu
CreateMenu
CreateIcon
CloseClipboard
ClientToScreen
ChildWindowFromPoint
CheckMenuItem
CharUpperBuffA
CharToOemA
CharNextA
CharLowerBuffA
CharLowerA
CallWindowProcA
InflateRect
DestroyIcon
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
OffsetRect
OemToCharA
MsgWaitForMultipleObjects
MessageBoxA
MessageBeep
MapWindowPoints
MapVirtualKeyA
LoadStringA
GetMenuItemInfoA
LoadKeyboardLayoutA
IsZoomed
IsWindowVisible
IsWindowEnabled
IsRectEmpty
IsIconic
IsDialogMessageA
IsChild
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindowDC
GetMenuStringA
GetTopWindow
GetActiveWindow
gdi32
GetSystemPaletteEntries
GetStockObject
GetRgnBox
GetPixel
GetPaletteEntries
GetObjectA
GetEnhMetaFilePaletteEntries
GetEnhMetaFileHeader
GetEnhMetaFileBits
GetDIBits
GetDIBColorTable
GetDeviceCaps
GetDCOrgEx
GetCurrentPositionEx
GetClipRgn
GetClipBox
GetBrushOrgEx
GetBitmapBits
ExtTextOutA
ExcludeClipRect
Ellipse
DeleteObject
DeleteEnhMetaFile
DeleteDC
CreateSolidBrush
CreateRoundRectRgn
CreateRectRgn
CreatePenIndirect
CreatePalette
CreateHalftonePalette
CreateFontIndirectA
CreateDIBSection
CreateDIBitmap
GetTextExtentPointA
GetTextMetricsA
GetViewportOrgEx
GetWindowOrgEx
GetWinMetaFileBits
IntersectClipRect
LineTo
MaskBlt
MoveToEx
PatBlt
Pie
PlayEnhMetaFile
Polygon
Polyline
RealizePalette
Rectangle
RectVisible
RestoreDC
RoundRect
SaveDC
SelectClipRgn
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetBrushOrgEx
SetDIBColorTable
SetEnhMetaFileBits
SetPixel
SetROP2
SetStretchBltMode
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
SetWinMetaFileBits
StretchBlt
UnrealizeObject
CreateCompatibleDC
GetTextExtentPoint32A
advapi32
StartServiceA
OpenSCManagerA
OpenServiceA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegEnumValueA
RegFlushKey
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegReplaceKeyA
RegSaveKeyA
RegSetValueExA
OpenProcessToken
oleaut32
VarI4FromStr
VarCyFromStr
VarBstrFromDate
VarBstrFromCy
VarBstrFromBool
VarBoolFromStr
SysReAllocStringLen
SysFreeString
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayRedim
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayGetUBound
VarNot
VarNeg
VariantChangeTypeEx
VariantClear
VariantCopyInd
VariantInit
VarR8FromStr
VarDateFromStr
Sections
.text Size: 432KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 545B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 732KB - Virtual size: 728KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsq128 Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE