Static task
static1
Behavioral task
behavioral1
Sample
9be0fea28f3ac0bf2b6d2be5b12c95b0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9be0fea28f3ac0bf2b6d2be5b12c95b0N.exe
Resource
win10v2004-20240709-en
General
-
Target
9be0fea28f3ac0bf2b6d2be5b12c95b0N.exe
-
Size
536KB
-
MD5
9be0fea28f3ac0bf2b6d2be5b12c95b0
-
SHA1
fac210cb9440306f42b9b4951692e63396a0f58e
-
SHA256
f2305ef90fbe69dbb8b1832f3df50e880097d836bc775842ffc3f5f264718cbf
-
SHA512
8eb53b2eec3e8767699483512eb76c2980668b00ba26e1ae5c029b1e00fb017ee8fec92d12a58e578807821162d866d18b05cbcf1ce960dfa35c6276785832fb
-
SSDEEP
12288:XA36IMSStLnkG2raw8wrDo/h0kYmvD9Oy:X06IM/kGo0R7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9be0fea28f3ac0bf2b6d2be5b12c95b0N.exe
Files
-
9be0fea28f3ac0bf2b6d2be5b12c95b0N.exe.exe windows:4 windows x86 arch:x86
3b7281f594f2acb93dfbd18235229176
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rmfft
nspcFft
nspsRealFft
nspsCcsFft
cddb
CDDBGetDiskInfo
CDDBQuery
CDDBSetOption
CDDBSetValues
CDDBSettingsDialog
MultipleCDDBQueryDlgProc
comctl32
ord17
ord6
winmm
mmioClose
mmioSeek
mmioAscend
mmioRead
mmioDescend
mmioOpenA
mmioWrite
mmioCreateChunk
waveOutReset
waveOutPrepareHeader
waveOutGetErrorTextA
waveOutOpen
waveOutWrite
waveOutClose
waveOutUnprepareHeader
waveOutGetDevCapsA
waveOutGetNumDevs
kernel32
TlsSetValue
LocalReAlloc
TlsFree
lstrcmpA
GlobalFlags
ResumeThread
GetCurrentThreadId
lstrcpyA
GetModuleHandleA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCPInfo
GetOEMCP
FlushFileBuffers
TlsAlloc
GetCurrentProcess
RtlUnwind
HeapFree
ExitProcess
TerminateProcess
HeapAlloc
GetSystemTimeAsFileTime
ExitThread
RaiseException
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
VirtualProtect
GetSystemInfo
VirtualQuery
SetStdHandle
GetLocaleInfoW
SetEnvironmentVariableA
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
InterlockedIncrement
InterlockedDecrement
GetLastError
SetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
FormatMessageA
lstrcpynA
LocalFree
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
WideCharToMultiByte
MultiByteToWideChar
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVolumeInformationA
_lopen
_lclose
WritePrivateProfileStringA
lstrcatA
GetTickCount
CreateThread
GlobalUnlock
GlobalFree
GlobalAlloc
GlobalLock
GetPrivateProfileStringA
CreateFileA
WriteFile
InitializeCriticalSection
CreateSemaphoreA
SetThreadPriority
DeleteCriticalSection
GetSystemDirectoryA
GetWindowsDirectoryA
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
SetEvent
WinExec
GetModuleFileNameA
ReadFile
SetFilePointer
GetLogicalDrives
GetDriveTypeA
GetVersionExA
LoadLibraryA
GetProcAddress
CreateEventA
ResetEvent
WaitForSingleObject
CloseHandle
FreeLibrary
SetEndOfFile
user32
MapWindowPoints
GetMessagePos
GetMessageTime
GetTopWindow
GetForegroundWindow
RemovePropA
GetPropA
SetPropA
GetClassInfoExA
GetClassLongA
GetCapture
RegisterWindowMessageA
TabbedTextOutA
DrawTextExA
GrayStringA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
PeekMessageA
ValidateRect
GetWindow
PtInRect
GetFocus
GetClassNameA
GetLastActivePopup
UnhookWindowsHookEx
GetSysColorBrush
GetMenuState
GetMenuItemID
GetMenuItemCount
DestroyWindow
GetDlgCtrlID
GetWindowDC
CallNextHookEx
CreateWindowExA
SetWindowLongA
TrackPopupMenu
CallWindowProcA
GetCursorPos
FillRect
DrawTextA
GetAsyncKeyState
GetParent
GetDlgItemTextA
CharUpperA
DeleteMenu
GetWindowTextA
ModifyMenuA
GetMenuStringA
SetCursor
LoadMenuA
GetSubMenu
DestroyMenu
CharLowerA
GetDlgItemInt
IsDlgButtonChecked
CheckRadioButton
SetDlgItemInt
LoadIconA
LoadCursorA
RegisterClassExA
CreateDialogParamA
SetScrollRange
GetClientRect
LoadAcceleratorsA
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowEnabled
GetSystemMetrics
GetDC
ReleaseDC
BeginPaint
EndPaint
KillTimer
PostQuitMessage
InvalidateRect
GetWindowLongA
SetScrollPos
CheckMenuItem
SetWindowPos
GetSysColor
ClientToScreen
GetKeyState
SetTimer
DefWindowProcA
SendDlgItemMessageA
EnumChildWindows
GetMenu
EnableMenuItem
PostMessageA
SetWindowTextA
ShowWindow
GetWindowRect
ScreenToClient
MoveWindow
MessageBeep
DialogBoxParamA
SetForegroundWindow
AdjustWindowRectEx
WinHelpA
GetDlgItem
SendMessageA
EnableWindow
EndDialog
SetDlgItemTextA
SetFocus
MessageBoxA
GetClassInfoA
RegisterClassA
UnregisterClassA
CheckDlgButton
TranslateAcceleratorA
gdi32
GetTextMetricsA
CreateFontIndirectA
GetTextExtentPoint32A
SetMapMode
GetDeviceCaps
CreateBitmap
GetClipBox
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SelectObject
DeleteDC
GetStockObject
CreateSolidBrush
DeleteObject
SetBkColor
SetTextColor
UnrealizeObject
ScaleViewportExtEx
SetBrushOrgEx
RestoreDC
SaveDC
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
shell32
DragFinish
DragQueryFileA
DragAcceptFiles
ShellExecuteA
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 344KB - Virtual size: 343KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 76KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ