Static task
static1
Behavioral task
behavioral1
Sample
95a5193d17d8066cafb95e4b1309a0ec3ee0d71f590f7eb65f6f8af3ba052b18.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
95a5193d17d8066cafb95e4b1309a0ec3ee0d71f590f7eb65f6f8af3ba052b18.exe
Resource
win10v2004-20240611-en
General
-
Target
95a5193d17d8066cafb95e4b1309a0ec3ee0d71f590f7eb65f6f8af3ba052b18
-
Size
404KB
-
MD5
e098d0f686e88343309dea29efe0c3d8
-
SHA1
4571728a905895a0ebd4c81e650152926b248fba
-
SHA256
95a5193d17d8066cafb95e4b1309a0ec3ee0d71f590f7eb65f6f8af3ba052b18
-
SHA512
e5092985e56aea2a48ccddbdbf7080665ef6f58dc85978b6430903ad606bfff12dc69bf19e55f07496b542922193683e93ecca18da415db1c08a7aa1d4ef88ef
-
SSDEEP
6144:nw29bxwF2PKMYSu1Gd1l83WvQmnbSUOT9a/4DZjUE/vAfR6X:nw29bxwF2yLPGdU3WvQJUOpBUEXR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95a5193d17d8066cafb95e4b1309a0ec3ee0d71f590f7eb65f6f8af3ba052b18
Files
-
95a5193d17d8066cafb95e4b1309a0ec3ee0d71f590f7eb65f6f8af3ba052b18.exe windows:4 windows x86 arch:x86
7776e98940740adf9f5815f49a39afd1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GetFileType
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetProfileStringA
InterlockedExchange
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapCreate
HeapDestroy
LocalFree
GetVersionExA
GetEnvironmentVariableA
IsBadWritePtr
GetACP
HeapSize
TerminateProcess
HeapFree
GetLocalTime
GetSystemTime
GetTimeZoneInformation
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
HeapAlloc
HeapReAlloc
RtlUnwind
GetTickCount
WritePrivateProfileStringA
SetErrorMode
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SizeofResource
GlobalFlags
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetTempFileNameA
GetFileAttributesA
GlobalAlloc
MulDiv
lstrcmpA
GetThreadLocale
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
VirtualAlloc
VirtualFree
LoadLibraryA
GetProcAddress
SetLastError
ResetEvent
WaitForSingleObject
CreateThread
lstrcpyA
CreateEventA
GetModuleFileNameA
Sleep
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetCurrentThread
GetLastError
GetCurrentProcess
CloseHandle
InterlockedDecrement
FormatMessageA
lstrlenA
LocalAlloc
user32
LockWindowUpdate
GetDCEx
InvertRect
LoadStringA
GetSysColorBrush
GetClassNameA
WindowFromPoint
KillTimer
SetTimer
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
SetRect
MapDialogRect
SetWindowContextHelpId
ShowOwnedPopups
PostQuitMessage
GetSystemMenu
DeleteMenu
AppendMenuA
SetParent
IsZoomed
BringWindowToTop
ReuseDDElParam
SetMenu
GetDesktopWindow
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
DestroyMenu
IsRectEmpty
FillRect
FindWindowA
CharUpperA
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
SetCursor
LoadCursorA
DestroyCursor
SetCursorPos
GetDC
ReleaseDC
PtInRect
ReleaseCapture
ClientToScreen
SetCapture
RedrawWindow
InflateRect
ShowWindow
CharNextA
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
LoadIconA
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
wsprintfA
SendMessageA
MessageBoxA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
EnableWindow
IsWindowVisible
ScrollWindow
GetScrollInfo
SetScrollInfo
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
CopyAcceleratorTableA
GetNextDlgGroupItem
MessageBeep
GetTabbedTextExtentA
RegisterClipboardFormatA
MoveWindow
PostThreadMessageA
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
GetClientRect
ShowScrollBar
GetSubMenu
LoadMenuA
ScreenToClient
InvalidateRect
CopyRect
SetWindowLongA
GetWindowLongA
LoadImageA
IsWindowEnabled
GetDlgItem
GetParent
DestroyWindow
CreateDialogIndirectParamA
GetSystemMetrics
IsWindow
SetActiveWindow
GetActiveWindow
EndDialog
GetNextDlgTabItem
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
IntersectRect
OffsetRect
RegisterWindowMessageA
SetWindowPos
GetWindow
SetForegroundWindow
GetForegroundWindow
GetLastActivePopup
GetMessagePos
GetMessageTime
GetSysColor
CallWindowProcA
RemovePropA
DefWindowProcA
UnpackDDElParam
gdi32
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
CreatePatternBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
CreateRectRgn
CreateFontIndirectA
GetMapMode
SetRectRgn
CombineRgn
BitBlt
GetTextColor
GetBkColor
GetNearestColor
GetStretchBltMode
GetPolyFillMode
GetTextAlign
GetBkMode
GetROP2
GetTextFaceA
GetWindowOrgEx
GetCurrentPositionEx
SetTextAlign
LineTo
MoveToEx
IntersectClipRect
ExcludeClipRect
SelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetStretchBltMode
Escape
CreateDIBitmap
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
CreateDCA
SetAbortProc
StartDocA
StartPage
EndPage
EndDoc
AbortDoc
GetViewportOrgEx
CreatePen
Rectangle
GetStockObject
GetDeviceCaps
CreateFontA
GetCharWidthA
DeleteObject
CreateCompatibleBitmap
StretchDIBits
DeleteDC
GetTextMetricsA
GetTextExtentPoint32A
DPtoLP
LPtoDP
CreateRectRgnIndirect
SelectObject
PatBlt
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetObjectA
GetTextExtentPointA
CreateCompatibleDC
StretchBlt
SetROP2
comdlg32
PrintDlgA
CommDlgExtendedError
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
LookupPrivilegeValueA
OpenProcessToken
OpenThreadToken
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
SetFileSecurityA
GetFileSecurityA
AdjustTokenPrivileges
RegSetValueExA
RegCreateKeyExA
shell32
DragQueryFileA
DragFinish
ShellExecuteA
comctl32
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
oledlg
ord8
ole32
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
OleRun
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoTaskMemAlloc
olepro32
ord253
oleaut32
VariantClear
SysAllocString
SafeArrayDestroyData
VariantCopy
VariantInit
SafeArrayPutElement
SafeArrayCreate
SysFreeString
VariantChangeType
SafeArrayGetElement
SysAllocStringByteLen
VarBstrFromCy
SysAllocStringLen
SysStringLen
VariantTimeToSystemTime
GetErrorInfo
ws2_32
closesocket
WSACleanup
htons
connect
gethostbyname
send
recv
socket
WSAStartup
Sections
.text Size: 300KB - Virtual size: 297KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ