Static task
static1
Behavioral task
behavioral1
Sample
4a007eacc2e6bf0b66202dd035ca1890.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4a007eacc2e6bf0b66202dd035ca1890.exe
Resource
win10v2004-20240704-en
General
-
Target
4a007eacc2e6bf0b66202dd035ca1890.exe
-
Size
176KB
-
MD5
4a007eacc2e6bf0b66202dd035ca1890
-
SHA1
39e65e5a76469f11bf0acd4a7c7569b9621032d3
-
SHA256
029e8f2d6c1c768b1313f0d251ba1dce593a572109769a8ab689f3603d474667
-
SHA512
753c2493faa3e1c221eddf8e9d829cc0185312ee5983ed6402cf0dc9bb028b97d0293d5e6183ec35ebda61690c307f6f8d1681c2ff9ecefec535c3eb41c3ba9a
-
SSDEEP
3072:Kg2jwCnXNOh3eq6ZVTTk7uxT+eapZPapYsgs9NEqxMsdSl:z+XQUXQyTv9is
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a007eacc2e6bf0b66202dd035ca1890.exe
Files
-
4a007eacc2e6bf0b66202dd035ca1890.exe.exe windows:4 windows x86 arch:x86
40bd2c1c40c850dcc57383b696ef93fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
FindClose
FindFirstFileA
GetVolumeInformationA
GetStringTypeExA
GetThreadLocale
GetFileSize
LocalFileTimeToFileTime
SystemTimeToFileTime
WritePrivateProfileStringA
GetCurrentDirectoryA
SetErrorMode
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
HeapAlloc
HeapFree
TerminateProcess
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
MoveFileA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SetLastError
GlobalFlags
MulDiv
LocalFree
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
CloseHandle
GetPrivateProfileStringA
GlobalAlloc
lstrcmpA
GetCurrentThread
MultiByteToWideChar
GetLastError
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetFullPathNameA
GetTempFileNameA
GetFileAttributesA
lstrcpynA
GetModuleFileNameA
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
lstrlenA
_llseek
_lread
_lclose
_lwrite
lstrcpyA
GetWindowsDirectoryA
GetPrivateProfileIntA
OpenFile
FreeEnvironmentStringsW
user32
IsDialogMessageA
SetWindowTextA
ShowWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
ReleaseCapture
SetCursor
GetDesktopWindow
DestroyMenu
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
InvalidateRect
BringWindowToTop
PostQuitMessage
ShowOwnedPopups
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
GetClassNameA
PtInRect
ClientToScreen
ReleaseDC
GetDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetSysColorBrush
LoadStringA
CharUpperA
InsertMenuA
DeleteMenu
GetMenuStringA
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
SetFocus
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetClientRect
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
IsWindowVisible
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
GetFocus
LoadIconA
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
IsWindowEnabled
SendMessageA
wsprintfA
GetDlgItem
EnableWindow
GetDlgCtrlID
UnregisterClassA
gdi32
GetStockObject
DeleteDC
SaveDC
RestoreDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
DeleteObject
CreateSolidBrush
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegDeleteKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
shell32
DragQueryFileA
DragFinish
comctl32
ord17
Sections
.text Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ