Static task
static1
Behavioral task
behavioral1
Sample
4dbfd7b9e1913f8465b86e778fca3740N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4dbfd7b9e1913f8465b86e778fca3740N.exe
Resource
win10v2004-20240802-en
General
-
Target
4dbfd7b9e1913f8465b86e778fca3740N.exe
-
Size
4.1MB
-
MD5
4dbfd7b9e1913f8465b86e778fca3740
-
SHA1
2a3d3e45ae72950737426de37d266cb68c024539
-
SHA256
112d9463f15641ceacd949c699d09222ab9fd26cb8818bca3bc90cb730205f79
-
SHA512
55e3186002eda6ce68290b71163c65bbbc4885e0edc3f9525240a97b3df99053dabcb063af4d38d574bc894a43750a8d3fd9f1ede9367f39107c088984fc45d1
-
SSDEEP
98304:LF7tXrcjf3aKap8n+CN/HaeobjXmf4D/5dxyKTI:p7hOfqKap8n+CN/HaeojlI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dbfd7b9e1913f8465b86e778fca3740N.exe
Files
-
4dbfd7b9e1913f8465b86e778fca3740N.exe.exe windows:4 windows x86 arch:x86
bd64df1bf0dd00164886e433b1eb778b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
kernel32
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPriorityClass
GetPrivateProfileSectionW
GetPrivateProfileStringW
GetProcessHeap
GetProcessTimes
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadLocale
GetThreadPriority
GetThreadTimes
GetTimeFormatA
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExA
GetVersionExW
GetVolumeInformationW
GlobalAddAtomW
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomW
GlobalFlags
GlobalFree
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadStringPtrW
IsValidCodePage
IsValidLocale
LCMapStringA
LCMapStringW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalReAlloc
LockFile
GetLocaleInfoW
lstrcmpA
lstrcmpW
lstrcpynA
lstrlenA
lstrlenW
MulDiv
MultiByteToWideChar
OpenProcess
OutputDebugStringW
PeekNamedPipe
QueryPerformanceCounter
RaiseException
ReadFile
ReleaseMutex
ResumeThread
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetEvent
SetFilePointer
SetHandleCount
SetLastError
SetPriorityClass
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnlockFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
WritePrivateProfileStringW
WriteProcessMemory
CreateToolhelp32Snapshot
Thread32First
Thread32Next
GetCurrentProcess
GetVersion
RtlUnwind
GetLocaleInfoA
GetLastError
GetFullPathNameW
GetFileType
GetFileTime
GetFileSize
GetFileAttributesW
GetExitCodeThread
GetEnvironmentStringsW
GetEnvironmentStrings
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCPInfo
GetConsoleOutputCP
GetConsoleMode
GetConsoleCP
GetCommandLineW
FreeResource
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageW
FlushFileBuffers
FindResourceW
FindResourceExW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExitThread
ExitProcess
EnumSystemLocalesA
EnumResourceLanguagesW
DuplicateHandle
DeleteCriticalSection
CreateThread
CreateProcessW
CreatePipe
CreateMutexW
CreateFileW
CreateFileA
CreateEventW
CreateDirectoryW
ConvertDefaultLocale
CompareStringW
CompareStringA
CloseHandle
GetStartupInfoW
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
GetACP
LoadLibraryA
GetProcAddress
GetOEMCP
GetDriveTypeA
GetEnvironmentVariableA
LockResource
user32
IsWindowEnabled
IsWindowVisible
KillTimer
LoadBitmapW
LoadCursorFromFileW
LoadCursorW
LoadIconW
LoadImageW
LoadMenuW
MapDialogRect
MapWindowPoints
MessageBeep
MessageBoxW
ModifyMenuW
MoveWindow
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
PtInRect
RegisterClassW
RegisterClipboardFormatW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
RemovePropW
ScreenToClient
ScrollWindow
SendDlgItemMessageA
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCapture
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemBitmaps
SetPropW
SetRect
SetRectEmpty
SetScrollInfo
SetTimer
SetWindowContextHelpId
SetWindowLongW
SetWindowPos
SetWindowRgn
SetWindowsHookExW
SetWindowTextW
ShowWindow
SystemParametersInfoA
TabbedTextOutW
TrackPopupMenu
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UnregisterClassW
UpdateWindow
ValidateRect
WindowFromPoint
WinHelpW
MessageBoxA
GetWindowRect
IsRectEmpty
GetWindowLongW
GetWindowDC
GetTopWindow
GetSystemMetrics
GetSysColorBrush
GetSubMenu
GetScrollPos
GetScrollInfo
GetPropW
GetParent
GetNextDlgTabItem
GetNextDlgGroupItem
GetMessageW
GetMessageTime
GetMessagePos
GetMenuState
GetMenuItemID
GetMenuItemCount
GetMenuCheckMarkDimensions
GetMenu
GetLastActivePopup
GetFocus
GetDlgItem
GetDlgCtrlID
GetDC
GetCursorPos
GetClientRect
GetClassLongW
GetClassInfoW
GetClassInfoExW
GetCapture
GetActiveWindow
FindWindowW
FillRect
EqualRect
EnumThreadWindows
EnumChildWindows
EndPaint
EndDialog
EnableWindow
EnableMenuItem
DrawTextW
DrawTextExW
DispatchMessageW
DestroyWindow
DestroyMenu
DefWindowProcW
CreateWindowExW
CreatePopupMenu
GetWindowThreadProcessId
GetForegroundWindow
GetKeyState
IsIconic
IsDialogMessageW
IsChild
InvalidateRgn
CreateDialogIndirectParamW
CopyRect
CopyAcceleratorTableW
ClientToScreen
CheckMenuItem
CharUpperW
CharNextW
CallWindowProcW
CallNextHookEx
BeginPaint
AppendMenuW
AdjustWindowRectEx
GetDesktopWindow
InvalidateRect
IntersectRect
InflateRect
GrayStringW
GetWindowTextW
GetWindowTextLengthW
GetWindowPlacement
GetWindowRgn
GetClassNameW
gdi32
ExtCreateRegion
ExtSelectClipRgn
ExtTextOutW
FrameRgn
GetBkColor
GetClipBox
GetDeviceCaps
GetMapMode
GetObjectW
GetRegionData
GetRgnBox
GetStockObject
GetTextColor
GetTextExtentPoint32W
GetViewportExtEx
GetWindowExtEx
LPtoDP
Escape
OffsetViewportOrgEx
PtVisible
RectVisible
RestoreDC
SaveDC
ScaleViewportExtEx
ScaleWindowExtEx
SelectObject
SetBkColor
SetBkMode
SetDIBColorTable
SetMapMode
SetStretchBltMode
SetTextColor
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
DPtoLP
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgnIndirect
CreateRectRgn
CreateFontIndirectW
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
CombineRgn
OffsetRgn
BitBlt
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
comdlg32
GetFileTitleW
CommDlgExtendedError
advapi32
LookupPrivilegeValueW
RegSetValueExW
RegQueryValueW
RegQueryValueExW
RegOpenKeyW
RegOpenKeyExW
RegEnumKeyW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
shell32
CommandLineToArgvW
ole32
CoGetClassObject
CoRevokeClassObject
CLSIDFromString
CLSIDFromProgID
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
StringFromIID
StgCreateDocfileOnILockBytes
OleUninitialize
OleInitialize
OleIsCurrentClipboard
OleFlushClipboard
CreateILockBytesOnHGlobal
CoTaskMemFree
CoFreeUnusedLibraries
CoTaskMemAlloc
shlwapi
PathFindFileNameW
PathIsDirectoryW
PathFindExtensionW
PathFileExistsW
PathAddBackslashW
PathIsUNCW
PathRemoveFileSpecW
PathStripToRootW
PathAppendW
Sections
.text Size: 768KB - Virtual size: 766KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_rhead_5 Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE