Static task
static1
Behavioral task
behavioral1
Sample
4567c948ff408b630ae5cbc24242ce9ce01bb7e75b0bc71ea8dcd43934fcbeea.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4567c948ff408b630ae5cbc24242ce9ce01bb7e75b0bc71ea8dcd43934fcbeea.exe
Resource
win10v2004-20240508-en
General
-
Target
4567c948ff408b630ae5cbc24242ce9ce01bb7e75b0bc71ea8dcd43934fcbeea
-
Size
8.8MB
-
MD5
805f345760134c6643054eece7ac72ec
-
SHA1
e6aadbd2e2a9bb16fc4d38df453ac8cf8060415a
-
SHA256
4567c948ff408b630ae5cbc24242ce9ce01bb7e75b0bc71ea8dcd43934fcbeea
-
SHA512
2ad23e8b6cf05a13f4ee3ca9bb0fb2374472b2c0df055d0124962f73e00e26493799be77446c1cf05a7ead49c7a3d696dad1585c802a3b49de1e3ebaeb8ea562
-
SSDEEP
196608:kBnDSVGFJcTqZuLZZLUnSag6SOHkmnY3n4a3NNmVf:xVGFCThLZZLag6SOHkmnY3n4a3NNmB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4567c948ff408b630ae5cbc24242ce9ce01bb7e75b0bc71ea8dcd43934fcbeea
Files
-
4567c948ff408b630ae5cbc24242ce9ce01bb7e75b0bc71ea8dcd43934fcbeea.exe windows:5 windows x86 arch:x86
2f0bef53badd6495c66b95dc10957e87
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiGetClassDevsW
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailW
kernel32
GetFileAttributesExW
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
SetFileAttributesW
GetFileAttributesW
GetFileSizeEx
GetFileTime
InterlockedExchange
CompareStringA
EnumResourceLanguagesW
ConvertDefaultLocale
GetCurrentThread
GlobalReAlloc
VirtualProtect
DeleteCriticalSection
GlobalFlags
LocalAlloc
TlsGetValue
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetSystemTimeAsFileTime
HeapFree
ExitProcess
HeapAlloc
GetTimeZoneInformation
HeapReAlloc
ExitThread
FileTimeToLocalFileTime
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
LCMapStringA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentDirectoryA
GetDriveTypeA
GetProcessHeap
SetEnvironmentVariableA
FileTimeToSystemTime
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
lstrcmpA
InterlockedDecrement
GetModuleHandleA
SetThreadPriority
GetCurrentProcessId
GlobalGetAtomNameW
GetThreadLocale
InterlockedIncrement
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
lstrcmpW
GetVersionExA
LoadLibraryA
GetProfileStringW
GlobalFree
GetCurrentProcess
SetCommTimeouts
SetCommMask
GetCommState
BuildCommDCBW
SetCommState
WaitCommEvent
GetCommMask
SuspendThread
ResumeThread
ClearCommError
PurgeComm
GetOverlappedResult
CreateThread
WaitForMultipleObjects
FindNextFileW
GetModuleFileNameW
GetTickCount
OutputDebugStringW
FindFirstFileW
FindClose
FormatMessageW
LocalFree
FreeLibrary
SetLastError
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetCPInfo
lstrcmpiW
GetVersion
Beep
GetSystemDefaultLangID
ResetEvent
CreateEventW
WaitForSingleObject
GetComputerNameW
SetEvent
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CopyFileW
CreateWaitableTimerW
SetWaitableTimer
SleepEx
GetLogicalDrives
GetDriveTypeW
CreateFileW
DeviceIoControl
EnterCriticalSection
LeaveCriticalSection
GetLocalTime
FreeResource
WinExec
GetCurrentDirectoryW
CreateMutexW
ReleaseMutex
InitializeCriticalSection
SetCurrentDirectoryW
ReadFile
WriteFile
LocalUnlock
LocalLock
MoveFileExA
GetSystemDirectoryA
CreatePipe
GetStartupInfoW
CreateProcessW
GetLastError
PeekNamedPipe
TerminateProcess
GetPrivateProfileStringW
WritePrivateProfileStringW
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
GetVersionExW
GetLocaleInfoW
CreateFileA
CloseHandle
Sleep
DeleteFileW
lstrlenA
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
HeapSize
user32
DefMDIChildProcW
DefFrameProcW
CharUpperW
CreateDialogIndirectParamW
EndDialog
SetWindowRgn
IsRectEmpty
EndPaint
BeginPaint
GetWindowDC
ValidateRect
UnpackDDElParam
ReuseDDElParam
DestroyMenu
GetWindowThreadProcessId
InsertMenuItemW
BringWindowToTop
TranslateAcceleratorW
CharNextW
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
SetDlgItemInt
GetDlgItemTextW
GetDlgItemInt
CheckRadioButton
CheckDlgButton
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
TranslateMDISysAccel
MapWindowPoints
ScrollWindow
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
DefWindowProcW
GetMenu
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetMenuStringW
IsChild
GetMenuCheckMarkDimensions
IsDlgButtonChecked
SetWindowLongW
IsIconic
DrawIcon
CallWindowProcW
MessageBoxW
GetClipboardData
CloseClipboard
OpenClipboard
TrackPopupMenu
SetParent
GetTopWindow
GetDlgCtrlID
ReleaseCapture
GetClassLongW
SetCapture
LockWindowUpdate
GetDCEx
DrawFrameControl
SetRectEmpty
RedrawWindow
DestroyCursor
LoadImageW
GetWindowLongW
PostQuitMessage
ShowOwnedPopups
MapDialogRect
SetWindowContextHelpId
IsZoomed
GetSystemMenu
CopyAcceleratorTableW
InvalidateRgn
WindowFromPoint
GetActiveWindow
DrawFocusRect
UnregisterClassW
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatW
GetMessagePos
FrameRect
GetIconInfo
CreateIconIndirect
IsMenu
InflateRect
DrawStateW
GetMenuItemInfoW
SystemParametersInfoW
DrawIconEx
DestroyIcon
GetSysColorBrush
GetDesktopWindow
GetMenuItemID
AppendMenuW
CreatePopupMenu
CreateMenu
DrawEdge
SetCursor
EnumChildWindows
SetCursorPos
mouse_event
GetNextDlgTabItem
GetMenuItemCount
GetWindow
SetWindowPos
SetForegroundWindow
IsWindow
ShowScrollBar
GetKeyState
PostThreadMessageW
MsgWaitForMultipleObjects
GetCursorPos
ScreenToClient
DrawMenuBar
GetMenuState
CheckMenuItem
DeleteMenu
LoadIconW
KillTimer
SetTimer
ReleaseDC
FillRect
SetRect
LoadAcceleratorsW
GetSystemMetrics
UpdateWindow
LoadBitmapW
LoadCursorW
GetDC
GetClientRect
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
ClientToScreen
LoadMenuW
ModifyMenuW
GetSubMenu
EnableMenuItem
PostMessageW
GetFocus
InvalidateRect
SetFocus
GetSysColor
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SendMessageW
EnableWindow
GetParent
IsWindowVisible
GetWindowRect
OffsetRect
PtInRect
CopyRect
SetMenuItemBitmaps
MessageBoxA
gdi32
CombineRgn
GetRgnBox
StretchDIBits
GetCharWidthW
SetRectRgn
CreateRectRgnIndirect
CreateEllipticRgn
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
GetBkColor
GetMapMode
GetViewportExtEx
GetWindowExtEx
ScaleViewportExtEx
DPtoLP
SetViewportExtEx
OffsetViewportOrgEx
SelectClipRgn
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetBkMode
RestoreDC
SaveDC
GetTextColor
GetClipBox
EndDoc
AbortDoc
EndPage
StartPage
StartDocW
SetWindowOrgEx
CreateDCW
CreatePatternBrush
ExtCreatePen
GetTextMetricsW
CreateRectRgn
GetViewportOrgEx
SetViewportOrgEx
CreateBitmap
SetBkColor
SetTextColor
GetStockObject
CreateDIBSection
DeleteObject
GetTextExtentPoint32W
SetPixel
GetPixel
PatBlt
Ellipse
GetBkMode
CreateFontIndirectW
CreatePen
PaintRgn
Rectangle
CreateFontW
CreateSolidBrush
StretchBlt
SelectObject
SetMapMode
GetObjectW
DeleteDC
GetDeviceCaps
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
BitBlt
LPtoDP
CreateCompatibleBitmap
CreateCompatibleDC
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
RegDeleteKeyW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyW
RegEnumValueW
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
shell32
ShellExecuteExW
SHGetPathFromIDListW
SHBrowseForFolderW
DragFinish
DragQueryFileW
ShellExecuteW
comctl32
_TrackMouseEvent
shlwapi
PathRemoveFileSpecW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
oledlg
OleUIBusyW
ole32
CoRevokeClassObject
CoFreeUnusedLibraries
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoInitializeEx
CoCreateInstance
CoTaskMemAlloc
OleInitialize
CoTaskMemFree
OleUninitialize
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
oleaut32
VariantClear
OleCreatePictureIndirect
OleLoadPicture
VariantInit
SysFreeString
SysAllocStringLen
VariantChangeType
OleCreateFontIndirect
SysStringLen
SysAllocString
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
gdiplus
GdiplusShutdown
GdiplusStartup
GdipCloneImage
GdipDrawImageRectI
GdipCreateFromHDC
GdipDisposeImage
GdipLoadImageFromFile
GdipDeleteGraphics
GdipAlloc
GdipFree
ws2_32
ioctlsocket
setsockopt
getpeername
accept
listen
getsockopt
shutdown
bind
WSAGetLastError
select
ntohs
sendto
recvfrom
gethostname
gethostbyname
ntohl
WSACleanup
recv
send
closesocket
connect
inet_addr
htons
socket
WSAStartup
inet_ntoa
htonl
odbc32
ord108
ord117
ord141
ord110
ord61
ord3
ord16
ord2
ord1
ord15
ord9
ord14
ord20
ord5
ord48
ord49
ord111
ord119
ord12
ord46
ord18
ord13
ord59
ord43
ord68
ord44
ord145
ord150
ord51
Sections
.text Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 557KB - Virtual size: 557KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 118KB - Virtual size: 45.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.6MB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ