Static task
static1
Behavioral task
behavioral1
Sample
cee2862f2117444613f76f731c0a4c9fd1876e17330657f4ca087536d4903ccc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cee2862f2117444613f76f731c0a4c9fd1876e17330657f4ca087536d4903ccc.exe
Resource
win10v2004-20240508-en
General
-
Target
cee2862f2117444613f76f731c0a4c9fd1876e17330657f4ca087536d4903ccc
-
Size
4.7MB
-
MD5
f65f04127a57dae1acbae7f1903c77dd
-
SHA1
d96f2ff221cbe3baa01eef7e3eee71091560b8f6
-
SHA256
cee2862f2117444613f76f731c0a4c9fd1876e17330657f4ca087536d4903ccc
-
SHA512
3a95d180638c9f73f5d9338c2981a5d91761844ed86409b0a11b44c97c5a1335b3c75de40641f829b4d4ff5d8d49017cffc4dd8a79370ec13cce464e118d081c
-
SSDEEP
98304:jUNV5xxqP6BKNi6htysuLhp5dW3P7LhD/EeCYaIa/q7:jUNV5KPIIhtyxkyYaIa/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cee2862f2117444613f76f731c0a4c9fd1876e17330657f4ca087536d4903ccc
Files
-
cee2862f2117444613f76f731c0a4c9fd1876e17330657f4ca087536d4903ccc.exe windows:4 windows x86 arch:x86
3de34cf8f346b3b9f814a3849f325f21
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
hook
setMyHook
clearMyHook
kernel32
GlobalFindAtomA
GlobalGetAtomNameA
MoveFileA
LockFile
UnlockFile
SetEndOfFile
GetThreadLocale
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetFileAttributesA
GetFileTime
GlobalFlags
GetCurrentDirectoryA
LocalAlloc
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetCPInfo
GetOEMCP
SetErrorMode
VirtualProtect
VirtualQuery
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
lstrcmpW
GetStartupInfoA
GetFileType
ExitProcess
SetConsoleCtrlHandler
RtlUnwind
RaiseException
SetStdHandle
HeapDestroy
HeapCreate
GetStdHandle
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetHandleCount
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
MulDiv
GetModuleFileNameW
FreeResource
GlobalAddAtomA
GetCurrentProcessId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
SetThreadAffinityMask
QueryPerformanceFrequency
FormatMessageA
GetCurrentThread
QueryPerformanceCounter
GetSystemDirectoryA
TlsFree
TlsAlloc
ReleaseMutex
GetCurrentThreadId
OpenThread
TlsSetValue
TlsGetValue
VirtualAlloc
VirtualFree
PurgeComm
BuildCommDCBA
WaitCommEvent
WaitForMultipleObjects
SetCommMask
GetOverlappedResult
CreateEventA
SetCommTimeouts
SetCommState
GetCommProperties
SetEvent
GetCommState
ClearCommError
SetupComm
FlushFileBuffers
LocalFree
GetExitCodeThread
InterlockedExchangeAdd
WaitForSingleObject
WritePrivateProfileStringA
OutputDebugStringA
TerminateProcess
GetTickCount
InterlockedDecrement
SetFilePointer
GetFileSize
LoadLibraryW
lstrcpynA
FreeLibrary
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
GetVersionExA
GetSystemInfo
DeviceIoControl
GlobalMemoryStatus
GetPrivateProfileStringA
lstrcpyA
GetACP
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateThread
DeleteFileA
CloseHandle
GetDiskFreeSpaceExA
GetModuleHandleA
LockResource
LoadLibraryA
RemoveDirectoryA
HeapSize
GetProcAddress
SetLastError
GetLogicalDriveStringsA
ReadFile
CreateProcessA
SizeofResource
GetDriveTypeA
WriteFile
GetProcessHeap
HeapFree
InterlockedIncrement
HeapAlloc
LoadResource
FindResourceA
CreateFileA
GetVersion
CompareStringA
IsDebuggerPresent
CreateMutexA
GetModuleFileNameA
SetFileAttributesA
GetLastError
InterlockedExchange
lstrlenW
MultiByteToWideChar
CompareStringW
Sleep
WideCharToMultiByte
GetPrivateProfileIntA
GetSystemDefaultLCID
GetCurrentProcess
lstrlenA
SetPriorityClass
GetCommandLineA
user32
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
WinHelpA
IsChild
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
MapWindowPoints
TrackPopupMenu
GetMenu
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetScrollInfo
SetScrollInfo
CallWindowProcA
GetWindowPlacement
EndPaint
BeginPaint
GetWindowDC
GetWindowTextLengthA
GetWindowTextA
SetFocus
GetMenuItemID
UnhookWindowsHookEx
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
GetNextDlgGroupItem
PeekMessageA
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetMenuState
CheckMenuItem
GetUpdateRect
IntersectRect
SendNotifyMessageA
MessageBoxA
IsRectEmpty
BringWindowToTop
RegisterWindowMessageA
ShowScrollBar
SetForegroundWindow
KillTimer
GetFocus
DefWindowProcA
GetDesktopWindow
GetClassInfoA
SetCapture
GetCapture
SystemParametersInfoA
ReleaseCapture
GetMessagePos
RedrawWindow
DrawFrameControl
DrawTextA
GrayStringA
DrawTextExA
SetRect
TabbedTextOutA
GetNextDlgTabItem
ClientToScreen
GetSubMenu
WindowFromPoint
CreateIconIndirect
GetIconInfo
InvalidateRgn
CopyAcceleratorTableA
CharNextA
DrawFocusRect
InflateRect
DrawStateA
OffsetRect
TrackPopupMenuEx
DestroyCursor
GetSysColor
FrameRect
GetActiveWindow
DestroyMenu
DestroyIcon
CopyRect
SetCursor
CloseClipboard
EmptyClipboard
OpenClipboard
PostThreadMessageA
RegisterClipboardFormatA
SetClipboardData
GetAsyncKeyState
LockWindowUpdate
UnregisterClassA
ValidateRect
MessageBeep
GetKeyState
GetSysColorBrush
GetParent
LoadCursorA
FillRect
DispatchMessageA
SetTimer
ScreenToClient
GetWindowRect
PostQuitMessage
IsIconic
DeleteMenu
LoadBitmapA
LoadIconA
DrawIcon
GetClientRect
ExitWindowsEx
SendMessageA
PtInRect
GetDC
SetWindowLongA
InvalidateRect
GetWindowLongA
ReleaseDC
EnableMenuItem
GetCursorPos
ShowWindow
CreatePopupMenu
AppendMenuA
GetMenuItemCount
IsWindow
PostMessageA
IsWindowVisible
LoadImageA
UpdateWindow
EnableWindow
GetDlgCtrlID
CharUpperA
GetSystemMetrics
ChangeDisplaySettingsA
ModifyMenuA
gdi32
SelectClipRgn
GetViewportExtEx
GetWindowExtEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetMapMode
DPtoLP
GetRgnBox
LPtoDP
SetBrushOrgEx
UnrealizeObject
LineTo
MoveToEx
GetClipBox
SetMapMode
SetStretchBltMode
SetROP2
SetBkMode
RestoreDC
SaveDC
DeleteDC
GetDeviceCaps
CreateDCA
CreatePolygonRgn
ExtFloodFill
CreateEllipticRgn
PtInRegion
Ellipse
GetROP2
Polyline
CreateRectRgn
GetCurrentObject
CreateBrushIndirect
GetBkColor
GetTextColor
GetTextExtentPoint32A
Rectangle
PtVisible
Escape
RectVisible
ExtTextOutA
CreateSolidBrush
TextOutA
SetTextColor
SetBkColor
SetPixel
CreateBitmap
GetPixel
GetStockObject
CreateFontIndirectA
GetBitmapBits
SetBitmapBits
SelectObject
CreateCompatibleBitmap
BitBlt
CreateFontA
DeleteObject
CreatePen
StretchBlt
CreateCompatibleDC
GetObjectA
CreateRectRgnIndirect
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueExA
LookupPrivilegeValueA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyA
RegOpenKeyA
RegOpenKeyExA
OpenProcessToken
RegCloseKey
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegSetValueA
AdjustTokenPrivileges
shell32
SHChangeNotify
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExA
ShellExecuteA
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ws2_32
htonl
ntohl
inet_ntoa
gethostbyname
WSACleanup
WSAStartup
gethostname
accept
listen
send
closesocket
socket
bind
recv
sendto
setsockopt
ntohs
htons
WSAGetLastError
inet_addr
WSARecvFrom
WSASendTo
getservbyport
getservbyname
WSASetLastError
gethostbyaddr
getsockname
select
connect
oledlg
ord8
ole32
CoTaskMemFree
CoUninitialize
CoInitialize
CoCreateGuid
CoCreateInstance
OleRun
CLSIDFromProgID
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CLSIDFromString
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
oleaut32
VariantClear
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringLen
SysStringLen
VariantChangeType
SysAllocString
SafeArrayGetUBound
SysFreeString
SysStringByteLen
VariantInit
SafeArrayDestroy
SysAllocStringByteLen
VariantCopy
SafeArrayCreateVector
GetErrorInfo
winmm
waveOutUnprepareHeader
waveOutPrepareHeader
waveOutOpen
waveOutClose
waveOutWrite
PlaySoundA
dbghelp
MakeSureDirectoryPathExists
powrprof
ReadPwrScheme
GetActivePwrScheme
WritePwrScheme
SetActivePwrScheme
intfd
ord2
ord4
ord9
ord46
ord1
exp
?JMVSDK_CloseChannel@@YAHH@Z
?JMVSDK_Cif2Halfd1@@YAXH_N@Z
?JMVSDK_GetVideo_MJpeg@@YAHPAEPAH1PAKH@Z
?JMVSDK_CancelGetVideo@@YAHH@Z
?JMVSDK_SetSaturation@@YAXHH@Z
?JMVSDK_CancelGetVideo_Main@@YAHH@Z
?JMVSDK_OpenChannel@@YAHH@Z
?JMVSDK_ConfigChannel@@YAHW4VIDEOFORMAT@@W4VIDEORESOLUTION@@KHHHHH@Z
?JMVSDK_StartChannel_Sub@@YAHH@Z
?JMVSDK_StopChannel_Sub@@YAHH@Z
?JMVSDK_StartChannel@@YAHH@Z
?JMVSDK_StopChannel@@YAHH@Z
?JMVSDK_SetMotionDetect@@YAXHPAUtagRECT@@HHHH@Z
?JMVSDK_GetVideo_Main@@YAHPAPAEPAH1PAKH@Z
?JMVSDK_GetVideo@@YAHPAEW4COLORFORMAT@@PA_KHPAX@Z
?JMVSDK_SetBrightness@@YAXHH@Z
?JMVSDK_UnInitial@@YAHXZ
?JMVSDK_ForceKeyFrame@@YAHH_N@Z
?JMVSDK_SetHue@@YAXHH@Z
?JMVSDK_SetupMask@@YAHHPAUtagRECT@@H_N@Z
?JMVSDK_GetMotionDetectionResult@@YA_NH@Z
?JMVSDK_GetAudio@@YAHPAEPAHPA_KH@Z
?JMVSDK_PutVideo_Main@@YAHHPAE@Z
?JMVSDK_SetContrast@@YAXHH@Z
?JMVSDK_GetVideo_Sub@@YAHPAPAEPAH1PAKH@Z
?JMVSDK_StopChannel_MJpeg@@YAHH@Z
?JMVSDK_PutVideo_Sub@@YAHHPAE@Z
?JMVSDK_StartChannel_MJpeg@@YAHH@Z
?JMVSDK_StopMask@@YAHH_N@Z
?JMVSDK_CancelGetVideo_Sub@@YAHH@Z
?JMVSDK_SetYOffset@@YAHHH@Z
?JMVSDK_SetUVOffset@@YAHHH@Z
?JMVSDK_CancelGetAudio@@YAHH@Z
?JMVSDK_GetChannelHWConfig@@YAXHPAU_CHANNEL_HARDWARE_CONFIG@@@Z
?JMVSDK_GetChannelIndex@@YAHHHH@Z
?JMVSDK_GetDeviceInfo@@YAXHPAU_DEVICE_INFO@@@Z
?JMVSDK_Initial@@YAHXZ
?JMVSDK_GetDeviceCount@@YAHXZ
d3d9
Direct3DCreate9
ddraw
DirectDrawCreateEx
Sections
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 316KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 4KB - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE