Static task
static1
Behavioral task
behavioral1
Sample
c5c2cd526ed36483e143d74530f660fd45f1a544c6eca19f5868b9cf6324b9ea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5c2cd526ed36483e143d74530f660fd45f1a544c6eca19f5868b9cf6324b9ea.exe
Resource
win10v2004-20240508-en
General
-
Target
c5c2cd526ed36483e143d74530f660fd45f1a544c6eca19f5868b9cf6324b9ea
-
Size
6.3MB
-
MD5
6147d441de9830e39b5f739cbd2e85a8
-
SHA1
2c1180df8567ffeb82579c518897a56b73c61595
-
SHA256
c5c2cd526ed36483e143d74530f660fd45f1a544c6eca19f5868b9cf6324b9ea
-
SHA512
b430b8e6a89136f58bfaf46592ee9ba8deb42ad589f9c10f3eda03e33550ef28e7578cbf7d6a5d748ff3061342571a6c3056d824d370f40fe3057bba89c1a8f7
-
SSDEEP
49152:J06tUrSYxi9l6mQL5gpVadMmHRCrwe4E8dxVE+oKa5d3oOe2xCbskx7EWYaAPVDs:7GmQLoo3xDe4j2LVfNGdZcURzA5g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c5c2cd526ed36483e143d74530f660fd45f1a544c6eca19f5868b9cf6324b9ea
Files
-
c5c2cd526ed36483e143d74530f660fd45f1a544c6eca19f5868b9cf6324b9ea.exe windows:4 windows x86 arch:x86
9ed1ce051a2710f6eb8c04b7a41f49d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
SetThreadContext
InterlockedIncrement
TerminateProcess
VirtualFree
LeaveCriticalSection
IsBadReadPtr
GetVersion
CreateFileA
DeviceIoControl
GetVolumeInformationA
GetVersionExA
GetComputerNameA
FormatMessageA
GetSystemWow64DirectoryA
WritePrivateProfileStringA
GetCurrentDirectoryA
GetEnvironmentVariableA
GetFileAttributesA
GetStdHandle
RemoveDirectoryA
SetFileAttributesA
SetLocalTime
GetUserDefaultLCID
GetStartupInfoA
FindClose
FindFirstFileA
FindNextFileA
GetFileSize
HeapReAlloc
ExitProcess
GetTickCount
PostQueuedCompletionStatus
GetQueuedCompletionStatus
GetSystemInfo
CreateIoCompletionPort
GetThreadContext
DeleteCriticalSection
GetExitCodeProcess
ReadFile
PeekNamedPipe
CreatePipe
IsBadWritePtr
IsDBCSLeadByteEx
UnmapViewOfFile
CreateFileMappingA
OpenFileMappingA
EnterCriticalSection
VirtualAlloc
HeapFree
MoveFileA
Sleep
GetCurrentProcessId
OpenEventA
CreateDirectoryA
GetProcessTimes
RtlFillMemory
Module32Next
WriteFile
VirtualProtectEx
CreateEventA
SetProcessWorkingSetSize
DeleteFileA
GetModuleFileNameA
LoadLibraryExA
VirtualAllocEx
GetTimeFormatA
GetDateFormatA
TerminateThread
GetModuleHandleW
CopyFileA
VirtualQueryEx
Thread32Next
Thread32First
LocalFree
WideCharToMultiByte
LocalAlloc
GlobalUnlock
InterlockedDecrement
MultiByteToWideChar
SetEndOfFile
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
LCMapStringW
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileType
GetACP
HeapSize
RaiseException
RtlUnwind
GetCommandLineA
GetOEMCP
GetCPInfo
FlushFileBuffers
GetProcessVersion
FindResourceA
LoadResource
LockResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
HeapCreate
TryEnterCriticalSection
ReleaseMutex
ResumeThread
GetModuleFileNameW
GlobalFree
CreateMutexA
OpenMutexA
CreateProcessA
CancelWaitableTimer
IsDebuggerPresent
DebugActiveProcess
GetShortPathNameA
GetLongPathNameA
LCMapStringA
QueueUserAPC
lstrcpynA
InterlockedExchange
InterlockedExchangeAdd
InterlockedCompareExchange
HeapDestroy
SetLastError
GlobalFlags
MulDiv
lstrcpyA
lstrcatA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
GlobalDeleteAtom
GetLastError
SuspendThread
GlobalSize
GetSystemDirectoryA
OpenThread
FileTimeToSystemTime
GetLocalTime
GetThreadTimes
GetCurrentThread
SetWaitableTimer
CreateWaitableTimerA
GetCurrentThreadId
SetFilePointer
GetWindowsDirectoryA
WriteProcessMemory
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
ReadProcessMemory
GetExitCodeThread
WaitForSingleObject
CreateRemoteThread
GetModuleHandleA
lstrcmpA
lstrcmpiA
CloseHandle
OpenProcess
GlobalLock
VirtualFreeEx
GetCurrentProcess
SetHandleCount
InitializeCriticalSection
MapViewOfFile
FreeLibrary
GetTempPathA
RtlMoveMemory
CreateThread
lstrcpyn
GetProcAddress
LoadLibraryA
HeapAlloc
GetProcessHeap
GlobalAlloc
lstrlenA
MulDiv
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetFileAttributesA
FindClose
FindFirstFileA
GetTempPathA
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
CreateEventA
CreateThread
WritePrivateProfileStringA
GetVersionExA
GetLastError
LoadLibraryA
FreeLibrary
GetFullPathNameA
WideCharToMultiByte
MultiByteToWideChar
GetUserDefaultLCID
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
lstrlenA
lstrcatA
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
GetCurrentThreadId
GetModuleFileNameA
lstrlenW
InterlockedExchange
GetCommandLineA
GetTickCount
CreateProcessA
WaitForSingleObject
CloseHandle
ReadFile
LockResource
LoadResource
FindResourceA
SetEvent
CreateFileA
WaitForMultipleObjects
WriteFile
GetProfileStringA
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
ResumeThread
CreateSemaphoreA
SetFilePointer
GetFileSize
GetCurrentProcess
TerminateProcess
GetWindowsDirectoryA
GetSystemDirectoryA
SetLastError
QueryPerformanceFrequency
QueryPerformanceCounter
GetTimeZoneInformation
GetVersion
TerminateThread
FileTimeToSystemTime
CreateMutexA
ReleaseMutex
SuspendThread
InterlockedIncrement
InterlockedDecrement
LocalFree
FileTimeToLocalFileTime
lstrcpynA
DuplicateHandle
FlushFileBuffers
ExitProcess
LockFile
UnlockFile
SetEndOfFile
lstrcmpiA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcmpA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
TlsSetValue
LocalReAlloc
TlsGetValue
GetFileTime
GetCurrentThread
GlobalFlags
SetErrorMode
GetProcessVersion
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
GetSystemTime
GetLocalTime
RaiseException
HeapSize
GetACP
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
shlwapi
StrToIntExA
PathUnmakeSystemFolderA
PathRemoveBlanksA
PathIsSystemFolderA
PathMakeSystemFolderA
PathFileExistsA
PathIsDirectoryEmptyA
PathIsDirectoryA
PathRenameExtensionA
PathFindExtensionA
PathFindFileNameA
StrTrimA
user32
SetWindowTextA
GetClientRect
GetSystemMetrics
GetGUIThreadInfo
LoadKeyboardLayoutA
GetKeyboardLayoutList
UnloadKeyboardLayout
SetCursorPos
SetCapture
EnumThreadWindows
mouse_event
GetKeyboardState
CharLowerA
ReleaseCapture
GetAsyncKeyState
KillTimer
CallWindowProcW
GetDlgCtrlID
SendMessageTimeoutA
SetLayeredWindowAttributes
GetWindowLongA
EnumChildWindows
ClipCursor
RegisterWindowMessageA
CharUpperA
ReleaseDC
PrintWindow
GetDC
UpdateWindow
SetParent
GetParent
GetDoubleClickTime
SetForegroundWindow
PostQuitMessage
AttachThreadInput
IsWindowEnabled
GetLastActivePopup
ValidateRect
GetActiveWindow
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
UnregisterClassA
PtInRect
GetMenuItemCount
TabbedTextOutA
DrawTextA
GrayStringA
IsIconic
IsDialogMessageA
GetWindowPlacement
GetMessagePos
GetMessageTime
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
SetClassLongA
IsWindow
SetTimer
GetDlgItem
GetWindowTextLengthA
UnhookWindowsHookEx
GetWindow
SetFocus
MapVirtualKeyA
SendInput
MsgWaitForMultipleObjects
GetWindowInfo
FindWindowExA
EnumWindows
IsWindowVisible
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
wvsprintfA
SetWindowPos
EnableWindow
CreateWindowStationA
GetSysColorBrush
LoadStringA
DestroyMenu
CreateDialogIndirectParamA
EndDialog
WindowFromPoint
SetActiveWindow
keybd_event
GetWindowRect
SetWindowLongW
ExitWindowsEx
FlashWindowEx
GetCaretPos
FlashWindow
OpenIcon
GetPropA
RemovePropA
DestroyWindow
SetPropA
CreateWindowExA
IsZoomed
UpdateLayeredWindow
DefWindowProcA
GetAncestor
PeekMessageA
GetMessageA
DispatchMessageA
PostThreadMessageA
SystemParametersInfoA
GetKeyboardLayout
ActivateKeyboardLayout
GetKeyboardLayoutNameA
MessageBoxA
wsprintfA
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
EmptyClipboard
SendDlgItemMessageA
GetCursorPos
PostMessageA
GetKeyState
SendMessageA
GetForegroundWindow
GetFocus
InvalidateRect
SetWindowsHookExA
CallNextHookEx
ClientToScreen
FindWindowA
SetWindowLongA
MoveWindow
EnumDisplaySettingsA
ChangeDisplaySettingsA
ShowWindowAsync
ShowWindow
LoadCursorFromFileA
ShowCursor
SwapMouseButton
GetDesktopWindow
SetCursor
CallWindowProcA
TranslateMessage
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
TranslateAcceleratorA
IsWindowEnabled
ShowWindow
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
GetSubMenu
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
GetMessageA
WindowFromPoint
DrawFocusRect
DrawEdge
DrawFrameControl
TranslateMessage
LoadIconA
GetNextDlgTabItem
GetDesktopWindow
GetClassNameA
GetClassInfoA
DefWindowProcA
GetDlgItem
GetWindowTextA
EnumWindows
GetSystemMenu
SetWindowTextA
GetForegroundWindow
DeleteMenu
GetWindowTextLengthA
CharUpperA
GetWindowDC
GetMenu
DestroyIcon
SetMenu
PeekMessageA
IsIconic
SetFocus
GetActiveWindow
GetWindow
DestroyAcceleratorTable
SetWindowRgn
GetMessagePos
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
LoadStringA
GetSysColorBrush
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
WinHelpA
KillTimer
SetTimer
ReleaseCapture
GetCapture
SetCapture
GetScrollRange
SetScrollRange
SetScrollPos
SetRect
InflateRect
IntersectRect
WaitForInputIdle
wsprintfA
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
EmptyClipboard
GetSystemMetrics
GetCursorPos
MessageBoxA
SetWindowPos
SendMessageA
DestroyCursor
SetParent
IsWindow
PostMessageA
GetTopWindow
GetParent
GetFocus
GetClientRect
InvalidateRect
ValidateRect
UpdateWindow
EqualRect
GetWindowRect
SetForegroundWindow
DestroyMenu
TrackPopupMenu
IsChild
ReleaseDC
IsRectEmpty
FillRect
GetDC
SetCursor
LoadCursorA
SetCursorPos
SetActiveWindow
GetSysColor
SetWindowLongA
GetWindowLongA
RedrawWindow
EnableWindow
UnregisterClassA
IsWindowVisible
OffsetRect
PtInRect
IsZoomed
ole32
OleInitialize
CoCreateInstance
CLSIDFromString
OleUninitialize
OleInitialize
CLSIDFromProgID
CoRegisterMessageFilter
CLSIDFromProgID
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoFreeUnusedLibraries
OleUninitialize
OleRun
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
advapi32
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
LookupAccountSidA
GetUserNameA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
RegSetValueExA
CryptAcquireContextA
RegEnumValueA
RegCreateKeyA
RegCloseKey
RegFlushKey
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegQueryValueA
comdlg32
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
GetFileTitleA
gdiplus
GdipSetSmoothingMode
GdipSetClipHrgn
GdipCreateFromHDC
GdiplusStartup
GdipDrawPath
GdipDeletePen
GdipResetClip
GdipDeleteGraphics
GdipDeletePath
GdipCreatePen1
GdipDrawRectangle
shell32
SHGetSpecialFolderLocation
SHFileOperationA
SHGetSpecialFolderPathA
SHGetPathFromIDListA
SHGetFileInfoA
SHBrowseForFolderA
ShellExecuteEx
DragQueryFileA
DragFinish
ShellExecuteA
SHChangeNotify
ShellExecuteA
Shell_NotifyIconA
SHGetSpecialFolderPathA
wsock32
recvfrom
inet_addr
listen
accept
ord1141
connect
getpeername
recv
ord1142
ioctlsocket
WSACleanup
sendto
getsockname
send
htons
WSAStartup
closesocket
setsockopt
ord1140
bind
socket
ntohs
dbghelp
MakeSureDirectoryPathExists
winhttp
WinHttpTimeFromSystemTime
WinHttpTimeToSystemTime
oleaut32
VarR8FromCy
VarR8FromBool
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantChangeType
SysFreeString
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayDestroyDescriptor
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
VariantCopy
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayAccessData
SafeArrayGetUBound
UnRegisterTypeLi
LoadTypeLi
RegisterTypeLi
SafeArrayPutElement
SafeArrayCreate
SafeArrayDestroy
SysAllocString
VariantInit
VariantCopyInd
SafeArrayGetElement
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
VariantChangeType
VariantClear
VariantCopy
LHashValOfNameSys
gdi32
CreateDIBSection
TextOutA
SetTextColor
SetBkMode
CreateFontIndirectA
DeleteDC
DeleteObject
SelectObject
CreateRectRgn
CreateBitmap
SaveDC
RestoreDC
GetStockObject
SetBkColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
CreateCompatibleBitmap
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
ExtTextOutA
Escape
GetObjectA
CreateCompatibleDC
GetTextExtentPointA
GetPixel
CreateDCA
CreateCompatibleBitmap
GetPolyFillMode
GetStretchBltMode
GetROP2
GetBkColor
GetBkMode
GetTextColor
CreateRoundRectRgn
CreateEllipticRgn
PathToRegion
EndPath
BeginPath
GetWindowOrgEx
GetViewportOrgEx
GetWindowExtEx
GetDIBits
SelectPalette
StretchBlt
CreatePalette
GetSystemPaletteEntries
CreateDIBitmap
DeleteObject
SelectClipRgn
CreatePolygonRgn
GetClipRgn
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
CreateBitmap
SelectObject
CreatePen
PatBlt
CombineRgn
CreateRectRgn
FillRgn
CreateSolidBrush
CreateFontIndirectA
GetStockObject
GetObjectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
BitBlt
RealizePalette
CreateCompatibleDC
GetTextExtentPoint32A
GetDeviceCaps
CreatePatternBrush
GetTextMetricsA
Escape
ExtTextOutA
RectVisible
PtVisible
GetViewportExtEx
ExtSelectClipRgn
LineTo
MoveToEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetROP2
SetPolyFillMode
RestoreDC
SaveDC
SetDIBitsToDevice
SetTextColor
SetBkMode
TextOutA
SetBkColor
CreateRectRgnIndirect
CreateDIBSection
SetStretchBltMode
wininet
FtpOpenFileA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
InternetTimeToSystemTime
InternetOpenA
InternetTimeFromSystemTime
FtpGetFileSize
InternetSetCookieA
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
InternetGetConnectedState
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetGetConnectedState
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
psapi
GetModuleFileNameExA
imm32
ImmInstallIMEA
ws2_32
WSASend
WSARecv
WSAEnumNetworkEvents
WSAWaitForMultipleEvents
WSACloseEvent
WSACreateEvent
WSAEventSelect
WSASocketA
send
select
ntohl
accept
getpeername
ioctlsocket
recv
WSACleanup
WSAStartup
inet_ntoa
closesocket
WSAAsyncSelect
recvfrom
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
ImageList_Destroy
ord17
_TrackMouseEvent
oledlg
ord8
msvfw32
DrawDibDraw
avifil32
AVIStreamGetFrame
AVIStreamInfoA
iphlpapi
GetAdaptersInfo
winmm
waveOutOpen
midiOutUnprepareHeader
midiStreamOpen
midiStreamProperty
midiOutPrepareHeader
midiStreamOut
midiStreamStop
midiOutReset
midiStreamClose
midiStreamRestart
waveOutGetNumDevs
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
waveOutUnprepareHeader
PlaySoundA
waveOutRestart
waveOutPrepareHeader
rasapi32
RasGetConnectStatusA
RasHangUpA
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 336KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.9MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ