Static task
static1
Behavioral task
behavioral1
Sample
1d274c2e59eccbbe19fb66511b855a98192a062816975c98ca2e0a98d82bee47.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1d274c2e59eccbbe19fb66511b855a98192a062816975c98ca2e0a98d82bee47.exe
Resource
win10v2004-20240508-en
General
-
Target
1d274c2e59eccbbe19fb66511b855a98192a062816975c98ca2e0a98d82bee47
-
Size
493KB
-
MD5
b456465755e482e086d7e65091e54f44
-
SHA1
e16ebc90e0c207778a98a8182065dc7148325616
-
SHA256
1d274c2e59eccbbe19fb66511b855a98192a062816975c98ca2e0a98d82bee47
-
SHA512
c15fa97111251d7012cceeb854389d30f8a5297b99796f67b27f1713b29d8ac8ea4415a4e96fe7e2e14f0838ba3647366403c7b97fc8dca19e2ece0c8b2cd445
-
SSDEEP
6144:GhdPVs+MSLuKLc1n3FIZrfXCzIPG5outBdkstfs/531X1nOao4yRzUF4w7zFzyCa:CdPPMSqb1KyMul0F1PyhUF4wnxkHaK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d274c2e59eccbbe19fb66511b855a98192a062816975c98ca2e0a98d82bee47
Files
-
1d274c2e59eccbbe19fb66511b855a98192a062816975c98ca2e0a98d82bee47.exe windows:5 windows x86 arch:x86
04c5bd06874d46097969a16ee0601c16
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalReAlloc
GlobalHandle
LocalAlloc
LocalReAlloc
GlobalFlags
CompareStringW
GetLocaleInfoW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
SetStdHandle
TlsFree
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
LCMapStringW
GetTimeZoneInformation
GetStringTypeW
GetFileType
ExitProcess
GetStdHandle
HeapQueryInformation
GetCommandLineW
GetCommandLineA
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
MoveFileExW
RtlUnwind
OutputDebugStringW
TlsSetValue
TlsGetValue
TlsAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetFileAttributesExW
GetCurrentProcess
CreateFileW
GlobalGetAtomNameW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FileTimeToLocalFileTime
GetPrivateProfileIntW
lstrcmpA
GetCurrentThread
ResumeThread
SuspendThread
SetThreadPriority
GetCurrentProcessId
GlobalFindAtomW
GlobalAddAtomW
LoadLibraryA
GlobalDeleteAtom
LoadLibraryExW
FreeResource
GetCurrentThreadId
EncodePointer
FormatMessageW
LocalFree
GlobalFree
GetModuleHandleA
SetLastError
OutputDebugStringA
GetACP
WideCharToMultiByte
GetVolumeInformationW
FindNextFileW
FindFirstFileW
GetFullPathNameW
GetCurrentDirectoryW
GetDriveTypeW
FindClose
SetErrorMode
WritePrivateProfileStringW
GetPrivateProfileStringW
CreateProcessW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
DecodePointer
GlobalUnlock
GlobalLock
GlobalAlloc
GetVersionExW
MulDiv
GetModuleHandleW
lstrcpyW
WinExec
SetThreadExecutionState
GetShortPathNameW
lstrlenW
lstrcmpW
GetFileAttributesW
GetVersion
MultiByteToWideChar
CancelIo
CreateNamedPipeW
DeleteFileW
GetWindowsDirectoryW
GetTempPathW
GetSystemDirectoryW
GetModuleFileNameW
LoadLibraryW
CreateEventW
CreateMutexW
DisconnectNamedPipe
ConnectNamedPipe
GetTickCount
CloseHandle
FlushFileBuffers
ReadFile
WriteFile
WaitForSingleObject
SetEvent
GetLastError
GetProcAddress
FreeLibrary
FindResourceW
SizeofResource
LoadResource
LockResource
WriteConsoleW
user32
SetPropW
GetScrollPos
ValidateRect
GetForegroundWindow
SetActiveWindow
UpdateWindow
TrackPopupMenu
SetMenu
GetMenu
SetFocus
GetDlgCtrlID
IsWindowVisible
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPos
IsChild
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
GetMessageTime
GetMessagePos
PeekMessageW
DispatchMessageW
LoadBitmapW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
EndPaint
BeginPaint
ReleaseDC
GetWindowDC
GetDC
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
GetPropW
SendDlgItemMessageA
LoadStringW
EnumWindows
GetWindowTextW
UnregisterClassW
CopyIcon
MessageBeep
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
InvalidateRect
LoadImageW
SetWindowLongW
GetWindowLongW
SetDlgItemTextW
DestroyWindow
IsWindowEnabled
DrawIconEx
InflateRect
GetMenuItemInfoW
AppendMenuW
GetMenuItemCount
GetMenuItemID
GetSubMenu
DestroyIcon
IntersectRect
SetMenuDefaultItem
CreatePopupMenu
SendMessageW
PostMessageW
EnableWindow
GetClientRect
GetSystemMetrics
KillTimer
SetTimer
GetLastInputInfo
IsMenu
GetDoubleClickTime
UnregisterHotKey
RegisterHotKey
RegisterWindowMessageW
GetWindow
DrawFocusRect
ScreenToClient
GetCursorPos
GetDlgItem
RemovePropW
GetWindowTextLengthW
AdjustWindowRectEx
MessageBoxW
MapWindowPoints
EqualRect
GetClassLongW
GetTopWindow
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
WinHelpW
MapVirtualKeyW
GetKeyNameTextW
MonitorFromWindow
GetMonitorInfoW
ShowWindow
OpenDesktopW
EnumDesktopsW
EnumDesktopWindows
CloseDesktop
GetProcessWindowStation
DefWindowProcW
IsIconic
SetForegroundWindow
FindWindowW
GetClassNameW
GetLastActivePopup
LoadIconW
SystemParametersInfoW
DrawEdge
IsWindow
CharNextW
CharPrevW
GetFocus
GetKeyState
GetCapture
SetCapture
ReleaseCapture
RedrawWindow
GetWindowRect
SetCursor
ClientToScreen
GetSysColor
FillRect
SetRectEmpty
CopyRect
OffsetRect
PtInRect
GetParent
RealChildWindowFromPoint
GetSysColorBrush
CharUpperW
ReuseDDElParam
UnpackDDElParam
InsertMenuItemW
TranslateAcceleratorW
LoadAcceleratorsW
BringWindowToTop
DestroyMenu
ShowOwnedPopups
PostQuitMessage
TranslateMessage
GetMessageW
WindowFromPoint
GetWindowThreadProcessId
GetDesktopWindow
GetActiveWindow
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamW
IsDialogMessageW
SetWindowTextW
LoadMenuW
LoadCursorW
IsDlgButtonChecked
CreateWindowExW
SendDlgItemMessageW
gdi32
SelectObject
GetObjectW
GetStockObject
GetDeviceCaps
CreatePen
CreatePatternBrush
CreateSolidBrush
DeleteDC
Escape
GetPixel
LineTo
PtVisible
RectVisible
RestoreDC
SaveDC
SetBkMode
SetMapMode
PatBlt
MoveToEx
TextOutW
ExtTextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
CreateFontW
GetTextColor
CreateFontIndirectW
CreateDIBitmap
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
GetTextExtentPoint32W
GetBkColor
SetBrushOrgEx
SetPixelV
Rectangle
GetBrushOrgEx
Ellipse
DeleteObject
CreateCompatibleDC
BitBlt
CreateCompatibleBitmap
comdlg32
CommDlgExtendedError
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegDeleteKeyW
RegEnumValueW
RegQueryValueW
RegEnumKeyW
RegCloseKey
RegSetValueW
RegCreateKeyW
RegDeleteValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
shell32
SHGetDesktopFolder
SHGetFolderPathW
DragQueryFileW
DragFinish
SHGetMalloc
SHGetPathFromIDListW
ShellExecuteW
Shell_NotifyIconW
ShellExecuteA
SHBrowseForFolderW
comctl32
ImageList_Draw
shlwapi
PathFindFileNameW
PathRemoveFileSpecW
PathIsUNCW
PathFindExtensionW
PathStripToRootW
ole32
CoCreateGuid
CoTaskMemFree
CoCreateInstance
CoInitialize
CoInitializeEx
CoUninitialize
oleaut32
SysAllocString
VariantChangeType
VariantClear
VariantInit
VarBstrFromDate
VarDateFromStr
VariantTimeToSystemTime
SystemTimeToVariantTime
SysFreeString
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 316KB - Virtual size: 316KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.giats Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ