Static task
static1
Behavioral task
behavioral1
Sample
dbff7036888b5c4c42d13ca204f3e1e7c3863656114058392b3ba02354138f34.exe
Resource
win7-20240221-en
General
-
Target
dbff7036888b5c4c42d13ca204f3e1e7c3863656114058392b3ba02354138f34
-
Size
1.7MB
-
MD5
57fd97496edd052df554dc090d64bf9d
-
SHA1
ca2adfb0260d1da7db6bc83b9093c7a21428bcbe
-
SHA256
dbff7036888b5c4c42d13ca204f3e1e7c3863656114058392b3ba02354138f34
-
SHA512
8c06ad4dd2827edac07f5b3c40121be8bdfc8a345c525d531357579b554d3786ff21c1db461981cb7990e89b2970be1daac35e280fe36aa3366e447a14f70a5b
-
SSDEEP
24576:WTyDD/lEjYi51sZMqEAuGzPRqz+B8jvi5HbCYL1HnUB4DipUTJQlbPm1:sA/mjlfiWv8bCkZUOBTKq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dbff7036888b5c4c42d13ca204f3e1e7c3863656114058392b3ba02354138f34
Files
-
dbff7036888b5c4c42d13ca204f3e1e7c3863656114058392b3ba02354138f34.exe windows:4 windows x86 arch:x86
726b66551124ce9434c3e7e8d674ff49
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
imm32
ImmReleaseContext
ImmSetCompositionWindow
ImmSetCompositionFontA
comctl32
ImageList_DragLeave
ord17
ImageList_Write
ImageList_SetIconSize
ImageList_SetBkColor
ImageList_Remove
ImageList_Read
ImageList_GetImageCount
ImageList_GetIconSize
ImageList_GetBkColor
ImageList_DrawEx
ImageList_DragShowNolock
ImageList_DragMove
ImageList_DragEnter
version
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
GlobalDeleteAtom
GlobalFindAtomA
GlobalFree
GetThreadLocale
GlobalLock
GlobalReAlloc
GlobalUnlock
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LoadLibraryExA
LoadResource
LocalAlloc
LocalFree
LockResource
lstrcpyA
lstrcpynA
lstrlenA
MoveFileA
MulDiv
MultiByteToWideChar
OpenFile
OpenProcess
RaiseException
ReadFile
RemoveDirectoryA
ResetEvent
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetThreadLocale
SizeofResource
Sleep
TerminateProcess
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
GetSystemDirectoryA
GlobalAlloc
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
GetLocaleInfoA
GetLastError
GetFullPathNameA
GetFileType
GetFileTime
GetFileSize
GetFileAttributesA
GetDiskFreeSpaceA
GetDateFormatA
GetBinaryTypeA
GetACP
FreeResource
FreeLibrary
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumCalendarInfoA
DosDateTimeToFileTime
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessA
CreateFileA
GetCPInfo
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
IsValidCodePage
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
ExitProcess
LeaveCriticalSection
LoadLibraryA
GlobalAddAtomA
GetVersionExA
GetStdHandle
GetVersion
GlobalHandle
user32
GetWindowRect
GetWindowTextA
GetWindowThreadProcessId
InflateRect
InsertMenuA
InsertMenuItemA
IntersectRect
InvalidateRect
IsChild
IsDialogMessageA
IsIconic
IsRectEmpty
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapA
LoadCursorA
LoadIconA
LoadKeyboardLayoutA
LoadStringA
MapVirtualKeyA
MapWindowPoints
MessageBeep
MessageBoxA
OemToCharA
OffsetRect
OpenClipboard
PeekMessageA
PeekMessageW
PostMessageA
PostQuitMessage
PtInRect
RedrawWindow
RegisterClassA
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropA
ScreenToClient
ScrollWindow
SendMessageA
SetActiveWindow
SetCapture
SetClassLongA
SetClipboardData
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemInfoA
SetParent
SetPropA
SetRect
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowsHookExA
SetWindowTextA
ShowOwnedPopups
ShowScrollBar
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
GetWindowPlacement
WaitMessage
WindowFromPoint
GetWindowDC
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetParent
GetMessagePos
GetMenuStringA
GetMenuState
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetLastActivePopup
GetKeyState
GetKeyNameTextA
GetKeyboardType
GetKeyboardState
GetKeyboardLayoutNameA
GetKeyboardLayoutList
GetForegroundWindow
GetFocus
GetDlgItem
GetDesktopWindow
GetDCEx
GetCursorPos
GetClipboardData
GetClientRect
GetClassInfoA
GetCapture
GetActiveWindow
FrameRect
FindWindowA
FillRect
EqualRect
EnumWindows
EnumThreadWindows
EnumChildWindows
EnableWindow
EnableScrollBar
EnableMenuItem
EmptyClipboard
DrawTextA
DrawMenuBar
DrawIconEx
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageW
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreateWindowExA
CreatePopupMenu
CreateMenu
CreateIcon
CloseClipboard
ClientToScreen
CheckMenuItem
CharUpperBuffA
CharToOemA
CharNextA
UpdateWindow
GetWindowLongA
CharLowerBuffA
CharLowerA
CallWindowProcA
IsWindowUnicode
GetWindowLongW
GetIconInfo
gdi32
GetStockObject
GetPixel
GetPaletteEntries
GetObjectA
GetBrushOrgEx
GetBitmapBits
GdiFlush
ExtTextOutA
ExcludeClipRect
Ellipse
DeleteObject
DeleteEnhMetaFile
DeleteDC
CreateSolidBrush
GetClipBox
GetCurrentPositionEx
GetDCOrgEx
GetSystemPaletteEntries
GetTextExtentPoint32A
CreatePenIndirect
GetTextMetricsA
GetWindowOrgEx
GetWinMetaFileBits
IntersectClipRect
LineTo
MaskBlt
MoveToEx
PatBlt
PlayEnhMetaFile
Polyline
RealizePalette
Rectangle
RectVisible
RestoreDC
RoundRect
SaveDC
SelectClipRgn
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetBrushOrgEx
SetDIBColorTable
SetEnhMetaFileBits
SetPixel
SetROP2
SetStretchBltMode
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
SetWinMetaFileBits
StretchBlt
UnrealizeObject
CreatePalette
CreateHalftonePalette
CreateFontIndirectA
CreateDIBSection
GetTextExtentPointA
CreateDIBitmap
GetEnhMetaFileHeader
GetEnhMetaFileBits
GetDIBits
GetDIBColorTable
GetDeviceCaps
GetEnhMetaFilePaletteEntries
advapi32
RegFlushKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
shell32
ShellExecuteA
oleaut32
VariantInit
VariantCopy
VariantClear
VariantChangeType
SysReAllocStringLen
SysFreeString
SysAllocStringLen
SafeArrayPtrOfIndex
Sections
.text Size: 420KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls2 Size: 4KB - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bsw111 Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE