Static task
static1
Behavioral task
behavioral1
Sample
clumsy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
clumsy.exe
Resource
win10v2004-20240419-en
General
-
Target
clumsy.exe
-
Size
1.5MB
-
MD5
3ef822e451f653f5a45243d927d7794b
-
SHA1
a18b9c9687cc3b12f50617d57d1160968b3cd0bf
-
SHA256
6371a3682483a9f08444d99958df335c069b19d62b880fd0cc6aab355d37953f
-
SHA512
60a2edeab1f710d85b07da95912707fbd6c4e6138fe6f4f3224a70f60304c702a36d3f0a39c16ad4592b5f654f012f0374c3b48ccb0fc7daf35fa4a6a407d347
-
SSDEEP
24576:7cYNGuLiC5Pg7Rh0K2Sfytm3fcnzFqMt9aRvZ/Bg7X1n:7zGuZ52Rh0Rgytm3mwvZ/S7X1n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource clumsy.exe
Files
-
clumsy.exe.exe windows:4 windows x64 arch:x64
185792a557de20fafe786e4247cdc85b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
GetTokenInformation
GetUserNameA
OpenProcessToken
comctl32
ImageList_Add
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_Draw
ImageList_EndDrag
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_GetImageInfo
InitCommonControlsEx
LBItemFromPt
MakeDragList
comdlg32
ChooseColorW
ChooseFontW
GetOpenFileNameW
GetSaveFileNameW
gdi32
Arc
BeginPath
BitBlt
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectW
CreateFontW
CreatePatternBrush
CreatePen
CreateRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DeleteDC
DeleteObject
EndPath
ExcludeClipRect
FillPath
GetDeviceCaps
GetEnhMetaFileBits
GetMetaFileBitsEx
GetObjectType
GetObjectW
GetStockObject
GetTextExtentPoint32W
GetTextMetricsW
MaskBlt
PatBlt
Pie
Polygon
Polyline
SelectClipRgn
SelectObject
SetBkColor
SetBkMode
SetDCBrushColor
SetPixelV
SetTextAlign
SetTextColor
TextOutW
kernel32
CloseHandle
CompareStringW
CreateFileW
CreateMutexA
CreateMutexW
CreateThread
DeleteCriticalSection
EnterCriticalSection
FormatMessageW
FreeLibrary
GetCPInfoExA
GetCPInfoExW
GetCommandLineW
GetComputerNameA
GetConsoleWindow
GetCurrentProcess
GetCurrentThreadId
GetFileAttributesW
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemDefaultUILanguage
GetSystemInfo
GetTickCount
GetVersionExA
GetVersionExW
GlobalAlloc
GlobalFree
GlobalLock
GlobalSize
GlobalUnlock
InitializeCriticalSection
IsDBCSLeadByteEx
IsWow64Process
LeaveCriticalSection
LoadLibraryW
LocalFree
MulDiv
MultiByteToWideChar
ReleaseMutex
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
__C_specific_handler
lstrcpyW
lstrcpynW
lstrlenW
msvcrt
___lc_codepage_func
___mb_cur_max_func
__argc
__argv
__getmainargs
__initenv
__iob_func
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_commode
_errno
_fmode
_initterm
_lock
_onexit
_setjmp
_time64
_unlock
_vscprintf
_vsnprintf
abort
atoi
calloc
clock
exit
fclose
fopen
fprintf
fputc
fputs
fread
free
fseek
fwrite
getenv
isalnum
isalpha
isspace
localeconv
longjmp
malloc
memcmp
memcpy
memmove
memset
printf
qsort
realloc
rand
setlocale
signal
sprintf
srand
sscanf
strcat
strchr
strcmp
strcpy
strcspn
strerror
strlen
strncmp
strncpy
strrchr
strstr
strtok
tolower
vfprintf
wcslen
ole32
CoInitializeEx
CoLockObjectExternal
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
DoDragDrop
OleInitialize
OleUninitialize
RegisterDragDrop
ReleaseStgMedium
RevokeDragDrop
shell32
DragAcceptFiles
DragFinish
DragQueryFileW
DragQueryPoint
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconW
user32
BeginPaint
CallNextHookEx
CallWindowProcW
CheckMenuItem
CheckMenuRadioItem
ChildWindowFromPointEx
ClientToScreen
CloseClipboard
CreateIconIndirect
CreateMDIWindowW
CreateMenu
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefMDIChildProcW
DefWindowProcW
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DragDetect
DrawEdge
DrawFocusRect
DrawFrameControl
DrawMenuBar
DrawTextW
EmptyClipboard
EnableMenuItem
EnableScrollBar
EnableWindow
EndDialog
EndPaint
EnumDisplayMonitors
EnumWindows
FillRect
FrameRect
GetActiveWindow
GetAsyncKeyState
GetCapture
GetCaretPos
GetClassInfoW
GetClientRect
GetClipboardData
GetClipboardFormatNameW
GetComboBoxInfo
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetFocus
GetForegroundWindow
GetKeyState
GetKeyboardLayout
GetMenuInfo
GetMenuItemID
GetMenuItemInfoW
GetMenuState
GetMessageExtraInfo
GetMessageW
GetParent
GetScrollInfo
GetSubMenu
GetSysColor
GetSystemMetrics
GetWindow
GetWindowInfo
GetWindowLongPtrW
GetWindowLongW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
InflateRect
InsertMenuItemW
InvalidateRect
IsClipboardFormatAvailable
IsIconic
IsMenu
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadCursorW
LoadIconA
LoadImageW
MapVirtualKeyA
MapVirtualKeyW
MessageBoxA
MessageBoxIndirectW
MessageBoxW
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PtInRect
RedrawWindow
RegisterClassW
RegisterClipboardFormatW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
RemoveMenu
ScreenToClient
SendInput
SendMessageA
SendMessageW
SetCapture
SetClipboardData
SetCursor
SetCursorPos
SetFocus
SetForegroundWindow
SetLayeredWindowAttributes
SetMenu
SetMenuInfo
SetMenuItemBitmaps
SetMenuItemInfoW
SetParent
SetRect
SetScrollInfo
SetScrollPos
SetTimer
SetWindowLongPtrW
SetWindowLongW
SetWindowPos
SetWindowTextW
SetWindowsHookExW
ShowCursor
ShowScrollBar
ShowWindow
SystemParametersInfoA
SystemParametersInfoW
TrackMouseEvent
TrackPopupMenu
TranslateMessage
UnhookWindowsHookEx
UpdateLayeredWindow
VkKeyScanA
winmm
timeBeginPeriod
timeEndPeriod
timeGetTime
windivert
WinDivertClose
WinDivertHelperCalcChecksums
WinDivertHelperParsePacket
WinDivertOpen
WinDivertRecv
WinDivertSend
WinDivertSetParam
Sections
.text Size: 453KB - Virtual size: 452KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 352KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 364KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/4 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/31 Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/45 Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/57 Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/70 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/81 Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/97 Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/113 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ