Static task
static1
Behavioral task
behavioral1
Sample
c4116773f4e25138bdcf335cd86399858db25c46eeff2a7351d123576f33e85a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c4116773f4e25138bdcf335cd86399858db25c46eeff2a7351d123576f33e85a.exe
Resource
win10v2004-20240704-en
General
-
Target
c4116773f4e25138bdcf335cd86399858db25c46eeff2a7351d123576f33e85a.exe
-
Size
997KB
-
MD5
6f212a2e64b9f35de8868a53879fc9e4
-
SHA1
57c819608a50be104708e133acd69b8a9ee9e950
-
SHA256
c4116773f4e25138bdcf335cd86399858db25c46eeff2a7351d123576f33e85a
-
SHA512
91478130f16dbbf57a5c32f82ece0e1e4ade0776da3fbd482e08496b6e4d860334f6d8ab4d4493580eeb5b302b95ec03875629bdb5b50b5f4ca1aca874220b17
-
SSDEEP
24576:dVQkkdom7NrsxcGtDy4yq0QbTJoOI5Bd:U8pRT2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c4116773f4e25138bdcf335cd86399858db25c46eeff2a7351d123576f33e85a.exe
Files
-
c4116773f4e25138bdcf335cd86399858db25c46eeff2a7351d123576f33e85a.exe.exe windows:5 windows x86 arch:x86
b5ff1428a6871d2008c8f08d27e9611a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegFlushKey
RegEnumKeyExW
RegCreateKeyExW
RegCreateKeyW
RegCloseKey
LookupAccountNameW
GetUserNameW
ConvertSidToStringSidW
user32
LoadStringW
MessageBoxA
CharNextW
CreateWindowExW
WaitMessage
TranslateMessage
TrackPopupMenu
ShowWindow
SetWindowPos
SetWindowPlacement
SetScrollInfo
SetParent
SetForegroundWindow
SetFocus
SetCursor
SendMessageW
ScreenToClient
ReleaseDC
ReleaseCapture
RegisterClassW
PtInRect
PostQuitMessage
PostMessageW
PeekMessageW
OffsetRect
OemToCharA
MsgWaitForMultipleObjects
MessageBoxW
LoadStringW
IsWindowEnabled
IsWindow
IsIconic
InvalidateRect
GetWindowThreadProcessId
GetWindowTextW
GetWindowRect
GetWindowPlacement
GetUpdateRgn
GetSystemMetrics
GetSysColor
GetScrollPos
GetScrollInfo
GetWindow
GetKeyState
GetForegroundWindow
GetFocus
GetDC
GetCursorPos
GetClientRect
GetCapture
FindWindowW
FillRect
EnumWindows
EndPaint
EnableWindow
DestroyWindow
DestroyIcon
CreatePopupMenu
CopyImage
ClientToScreen
CharUpperBuffW
CharUpperW
CharNextW
CharLowerW
BeginPaint
GetClassLongW
SetWindowLongW
GetWindowLongW
wvsprintfW
SetWindowTextW
SendMessageW
PostMessageW
PeekMessageW
MessageBoxW
LoadIconW
LoadCursorW
GetWindowTextLengthW
GetClassInfoW
DrawTextW
DispatchMessageW
DefWindowProcW
CreateWindowExW
CallWindowProcW
AppendMenuW
kernel32
lstrcmpiA
LoadLibraryA
LocalFree
LocalAlloc
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
SetCurrentDirectoryW
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
IsValidLocale
GetSystemDefaultUILanguage
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetUserDefaultUILanguage
GetLocaleInfoW
GetLastError
GetCurrentDirectoryW
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
ExitThread
CreateThread
CompareStringW
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleW
lstrlenW
lstrcmpW
WriteFile
WideCharToMultiByte
WaitForSingleObject
WaitForMultipleObjects
VirtualQueryEx
VirtualQuery
VirtualFree
TerminateThread
TerminateProcess
SwitchToThread
SuspendThread
Sleep
SizeofResource
SignalObjectAndWait
SetThreadPriority
SetLastError
SetFileTime
SetFilePointer
SetFileAttributesW
SetEvent
SetEndOfFile
SetCurrentDirectoryW
ResumeThread
ResetEvent
ReleaseMutex
ReadFile
OpenProcess
MultiByteToWideChar
MoveFileW
LockResource
LocalFileTimeToFileTime
LoadResource
LoadLibraryW
LeaveCriticalSection
IsValidLocale
InitializeCriticalSection
HeapFree
HeapAlloc
GetVersionExW
GetThreadPriority
GetThreadLocale
GetSystemTimeAsFileTime
GetStdHandle
GetProcessHeap
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileAttributesExW
GetFileAttributesW
GetExitCodeThread
GetExitCodeProcess
GetEnvironmentVariableW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetComputerNameW
GetCommandLineW
GetCPInfo
FreeResource
InterlockedExchangeAdd
InterlockedExchange
InterlockedCompareExchange
FreeLibrary
FormatMessageA
FormatMessageW
FindResourceExW
FindResourceW
FindNextFileW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
EnumCalendarInfoW
EnterCriticalSection
DosDateTimeToFileTime
DeleteFileW
DeleteCriticalSection
CreateThread
CreateProcessW
CreateMutexW
CreateFileW
CreateEventW
CreateDirectoryW
CompareStringW
CloseHandle
Sleep
QueryFullProcessImageNameW
LoadLibraryW
GetVolumeInformationW
GetModuleHandleW
GetModuleFileNameW
FindResourceExW
gdi32
SetTextColor
SetROP2
SetBrushOrgEx
SetBkMode
SetBkColor
SelectObject
MoveToEx
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgn
CreateBrushIndirect
GetTextExtentPoint32W
CreateFontIndirectW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
wininet
HttpSendRequestExA
InternetAttemptConnect
HttpEndRequestA
InternetWriteFile
InternetSetStatusCallback
InternetSetOptionA
InternetReadFile
InternetQueryDataAvailable
InternetOpenA
InternetCrackUrlW
InternetConnectA
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
shell32
ShellExecuteExW
ShellExecuteW
SHGetFolderPathW
IsUserAnAdmin
shlwapi
PathFileExistsW
PathCanonicalizeW
psapi
GetProcessImageFileNameW
comctl32
InitCommonControls
gdiplus
GdiplusShutdown
GdiplusStartup
GdipDeleteStringFormat
GdipCreateStringFormat
GdipMeasureString
GdipDrawString
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipResetClip
GdipSetClipPath
GdipDrawImageRectRectI
GdipDrawImagePointRectI
GdipDrawImageI
GdipFillRectangleI
GdipSetInterpolationMode
GdipSetSmoothingMode
GdipSetCompositingQuality
GdipDeleteGraphics
GdipCreateFromHDC
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipCreateBitmapFromScan0
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageVerticalResolution
GdipGetImageHorizontalResolution
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipLoadImageFromStream
GdipCreateSolidFill
GdipDeleteBrush
GdipAddPathArcI
GdipClosePathFigure
GdipDeletePath
GdipCreatePath
Sections
.text Size: 601KB - Virtual size: 601KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 21KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ