Static task
static1
Behavioral task
behavioral1
Sample
c8454478c89657239d1cd6469a94c49500bbdc2568eae50db01bde397f061a0e.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8454478c89657239d1cd6469a94c49500bbdc2568eae50db01bde397f061a0e.exe
Resource
win10v2004-20240704-en
General
-
Target
c8454478c89657239d1cd6469a94c49500bbdc2568eae50db01bde397f061a0e
-
Size
180KB
-
MD5
5e6b64e749251de40f6253a0c5a64905
-
SHA1
8b89945ab23498707d17410673bf8678452c295f
-
SHA256
c8454478c89657239d1cd6469a94c49500bbdc2568eae50db01bde397f061a0e
-
SHA512
1c623113f9f9353e57ede40f7ad96463a95770611e1a4f76ded1be179115b54011abad280dca28f9fd387843aafd4db7e34b186f8eb0d22246d788d0a0c0fb27
-
SSDEEP
3072:p+JUz5wl74NnKqAZrCKRjo8yfyCAtAYrqd9n+24cSu:Wg+4NKqA4KV4Bxf4U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c8454478c89657239d1cd6469a94c49500bbdc2568eae50db01bde397f061a0e
Files
-
c8454478c89657239d1cd6469a94c49500bbdc2568eae50db01bde397f061a0e.exe windows:4 windows x86 arch:x86
339f8aa64ff486a7efabcb2578d065a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
LoadLibraryA
Sleep
SetUnhandledExceptionFilter
lstrcmpiA
GetCommandLineA
InterlockedIncrement
lstrlenA
CreateFileA
GlobalLock
GlobalAlloc
FlushInstructionCache
HeapAlloc
GetCurrentThreadId
LocalFree
GetStartupInfoA
GetModuleHandleA
CreateThread
WaitForSingleObject
GetLastError
GetModuleFileNameA
VirtualQuery
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
InterlockedDecrement
HeapFree
SetEvent
lstrlenW
OpenProcess
GetExitCodeProcess
OutputDebugStringA
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
EnterCriticalSection
LeaveCriticalSection
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
CreateEventA
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryExA
GetProcAddress
FreeLibrary
GetDiskFreeSpaceExA
GetProcessHeap
GlobalUnlock
user32
PostMessageA
SetWindowLongA
GetWindowThreadProcessId
GetParent
DestroyWindow
DefWindowProcA
CallWindowProcA
CreateWindowExA
ShowWindow
SetFocus
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
SetWindowPos
BeginPaint
GetClientRect
EndPaint
UnionRect
PtInRect
InvalidateRect
GetKeyState
IsWindow
GetFocus
IsChild
GetMessageA
DispatchMessageA
wsprintfA
CharNextA
PostThreadMessageA
MessageBoxA
GetWindowLongA
gdi32
CloseMetaFile
DeleteMetaFile
CreateRectRgnIndirect
GetDeviceCaps
LPtoDP
SaveDC
SetMapMode
SetWindowOrgEx
TextOutA
SetTextAlign
Rectangle
RestoreDC
DeleteDC
SetWindowExtEx
CreateMetaFileA
SetViewportOrgEx
comdlg32
GetOpenFileNameA
GetSaveFileNameA
shell32
SHGetPathFromIDListA
ShellExecuteA
SHGetMalloc
SHBrowseForFolderA
ole32
OleRegEnumVerbs
OleRegGetUserType
CreateOleAdviseHolder
OleRegGetMiscStatus
CreateDataAdviseHolder
CoTaskMemAlloc
CoInitialize
CoUninitialize
CoTaskMemFree
oleaut32
VariantChangeType
GetErrorInfo
SetErrorInfo
CreateErrorInfo
SysFreeString
VariantInit
OleCreatePropertyFrame
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysAllocStringLen
videowindow
ReleaseVideoWindow
CreateVideoWindow
surveillance
ReleaseTransImp
GetTransModuleImp
atl
ord21
ord43
ord44
ord51
ord50
ord46
ord27
ord26
ord31
ord30
ord58
ord32
ord20
ord17
ord23
ord16
ord18
ord57
msvcp60
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDH@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
msvcrt
memset
__CxxFrameHandler
strncpy
??1type_info@@UAE@XZ
strstr
malloc
strlen
sprintf
??2@YAPAXI@Z
abs
free
_ftol
memcpy
_snprintf
_access
strcat
strcpy
_mbsrchr
_purecall
memcmp
realloc
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
wcslen
_CxxThrowException
strcmp
winmm
timeSetEvent
timeKillEvent
timeBeginPeriod
shlwapi
PathAddBackslashA
PathAppendA
PathRemoveFileSpecA
Sections
.text Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 393KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ