Static task
static1
Behavioral task
behavioral1
Sample
error422(1).exe
Resource
win10v2004-20240508-en
General
-
Target
error422(1).exe
-
Size
8.0MB
-
MD5
7b01e76578486d44bbafb0d51381820e
-
SHA1
0daa6b605200bf6fabd7a08f7de4c1eac4fd12d9
-
SHA256
7765f79269ebad7f33a0dc8d18360f5adf9464660f2259f9961cad0aa2f94bbd
-
SHA512
0c6d84c197713b3c8ab12bf23e1d6d828eca1cf7e11a047de0856046974abb2e297899c8a3c445a206c80fc963919a3cecaf8b5c336a349b821eb1df013a7c92
-
SSDEEP
196608:GiF+hNQl6gsLxL8QpNpKyro8thPVNadB:oC0bx5pTKs1JadB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource error422(1).exe
Files
-
error422(1).exe.exe windows:5 windows x86 arch:x86
0f1964956a31663774dfd5fb824bdb9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetForegroundWindow
MessageBoxA
ExitWindowsEx
EnumWindows
IsIconic
ShowWindow
MessageBoxW
GetLastActivePopup
IsWindowVisible
GetWindowThreadProcessId
MonitorFromPoint
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
ole32
CreateStreamOnHGlobal
CoCreateInstance
CoInitializeEx
GetHGlobalFromStream
CoUninitialize
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringA
SetStdHandle
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetTimeZoneInformation
GetLocaleInfoA
CompareStringA
CompareStringW
SetEndOfFile
WriteConsoleA
GetCurrentProcess
LCMapStringW
HeapCreate
HeapReAlloc
VirtualAlloc
GetLastError
CreateFileW
SetFilePointer
WriteFile
ReadFile
GetProcAddress
LoadLibraryA
GetUserDefaultLCID
CloseHandle
CreateFileA
CreateDirectoryA
FlushFileBuffers
WriteConsoleW
GetFileType
GetStdHandle
GetLongPathNameW
ExitProcess
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
MultiByteToWideChar
AreFileApisANSI
FindFirstFileW
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetWindowsDirectoryW
SetHandleInformation
CreatePipe
GetShortPathNameA
GetModuleFileNameA
GetShortPathNameW
GetModuleFileNameW
GetCurrentProcessId
GetLongPathNameA
GetWindowsDirectoryA
GetEnvironmentVariableA
GetTempPathA
GetEnvironmentVariableW
GetTempPathW
GetTempFileNameA
GetFullPathNameW
GetFullPathNameA
LoadLibraryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
GetExitCodeThread
WaitForSingleObject
CreateThread
GetConsoleOutputCP
DuplicateHandle
GetProcessHeap
SetEnvironmentVariableA
CreateProcessA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetVersionExA
SearchPathA
GetSystemTimeAsFileTime
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
Sleep
GetMailslotInfo
CreateMailslotA
GetCommandLineW
CreateSemaphoreA
SizeofResource
LockResource
LoadResource
FindResourceA
GlobalUnlock
GlobalSize
GlobalLock
GetTickCount
AllocConsole
GetModuleHandleA
LoadLibraryExA
SetEnvironmentVariableW
SetCurrentDirectoryW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
CreateDirectoryW
RemoveDirectoryW
HeapAlloc
HeapFree
GetCommandLineA
GetStartupInfoA
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
SetHandleCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualFree
Sections
.text Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ