Static task
static1
Behavioral task
behavioral1
Sample
097faa455aca09aa4db7568db7d6b1a1b4b08f43851fa9fbf7cc39193eb2fef4.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
097faa455aca09aa4db7568db7d6b1a1b4b08f43851fa9fbf7cc39193eb2fef4.exe
Resource
win10v2004-20240802-en
General
-
Target
097faa455aca09aa4db7568db7d6b1a1b4b08f43851fa9fbf7cc39193eb2fef4
-
Size
384KB
-
MD5
ba4ff8e143ded83cfebfee0bfcdef764
-
SHA1
4b625f71d37bfddfc8122f373052b08c06f41ecc
-
SHA256
097faa455aca09aa4db7568db7d6b1a1b4b08f43851fa9fbf7cc39193eb2fef4
-
SHA512
608bf8336c0da3164124736bc21a33652ab800766b47967b286e58a4e630abe8845797b189dfaa98395e24c3f4934953d5715d5feb2633b53242e9bb6151be33
-
SSDEEP
6144:tx5ixDBfw63tkWMVsv0Q4126/6dfYSWCyXHgL74cqXrURRl8g5cIQrZA:trc7eWMVkzYSUwLUDieIQlA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 097faa455aca09aa4db7568db7d6b1a1b4b08f43851fa9fbf7cc39193eb2fef4
Files
-
097faa455aca09aa4db7568db7d6b1a1b4b08f43851fa9fbf7cc39193eb2fef4.exe windows:4 windows x86 arch:x86
54661d9dc45366e2cd35ce40212e9b3a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord5298
ord2717
ord4074
ord4692
ord5303
ord5285
ord5710
ord4616
ord3733
ord561
ord815
ord6278
ord6279
ord2078
ord2613
ord1131
ord6211
ord5296
ord1143
ord4155
ord2858
ord4282
ord6777
ord1644
ord942
ord5949
ord3871
ord2859
ord2634
ord6632
ord3341
ord1941
ord4029
ord755
ord470
ord6330
ord6398
ord6399
ord2579
ord4400
ord3724
ord804
ord4262
ord1197
ord859
ord4270
ord3568
ord3621
ord2406
ord1634
ord3658
ord3566
ord3614
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord4269
ord823
ord765
ord3693
ord4197
ord2756
ord4219
ord5679
ord2755
ord4124
ord4272
ord860
ord6654
ord2680
ord1594
ord940
ord2372
ord6193
ord1565
ord922
ord818
ord2127
ord2855
ord2637
ord3716
ord3087
ord925
ord5568
ord795
ord2910
ord1165
ord2371
ord537
ord927
ord858
ord538
ord535
ord540
ord2810
ord861
ord6195
ord6868
ord800
ord4704
ord4229
ord2294
ord825
ord324
ord567
ord641
ord656
ord609
ord616
ord3569
ord4418
ord4621
ord4075
ord3074
ord3820
ord3826
ord3825
ord3397
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4831
ord3793
ord5286
ord4347
ord6370
ord5157
ord2377
ord3605
ord5237
ord4390
ord1768
ord4073
ord6051
ord2567
ord3592
ord4419
ord5276
ord4401
ord1767
ord6048
ord2506
ord4992
ord4847
ord4370
ord5261
ord3577
ord4392
ord2570
ord4213
ord2015
ord2403
ord6597
ord1569
msvcrt
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_controlfp
_memicmp
__CxxFrameHandler
clock
fmod
_ftol
time
memcpy
memset
memcmp
_wtoi
wcsrchr
free
sprintf
malloc
strlen
fclose
fwrite
_wfopen
wcscmp
wcscat
wcsstr
realloc
_except_handler3
_wcsicmp
_errno
_beginthreadex
fread
fseek
strftime
localtime
wcslen
_CxxThrowException
ftell
rewind
sin
cos
exit
putc
getc
_exit
_XcptFilter
_wcmdln
__wgetmainargs
kernel32
CreateFileW
WriteFile
CloseHandle
CopyFileW
WideCharToMultiByte
GetModuleFileNameW
lstrcpynW
SetProcessShutdownParameters
lstrcmpiW
lstrcmpW
GetProcAddress
SetThreadExecutionState
GetTickCount
DeleteFileW
OutputDebugStringA
LoadResource
FindResourceW
GetEnvironmentVariableW
lstrlenA
OutputDebugStringW
CreateThread
GetStartupInfoW
GetTempPathW
lstrlenW
lstrcatW
GetModuleHandleW
GetVersionExW
lstrcpyW
InterlockedDecrement
CreateMutexW
GetLocalTime
GetLastError
GetUserDefaultLangID
LoadLibraryW
GetCurrentProcess
GetSystemDirectoryW
GetFileAttributesW
LeaveCriticalSection
EnterCriticalSection
InterlockedIncrement
WaitForSingleObject
ResetEvent
InitializeCriticalSection
DeleteCriticalSection
Sleep
TerminateThread
WaitForMultipleObjects
SetEvent
LocalFree
GetCurrentThreadId
GetNumberFormatW
GetLocaleInfoW
SetSystemPowerState
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FreeLibrary
CreateDirectoryW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetTimeZoneInformation
GetModuleHandleA
CreateEventW
LockResource
user32
FindWindowExW
DrawAnimatedRects
GetSubMenu
CreateIconIndirect
GetIconInfo
DestroyMenu
GetMessagePos
TrackPopupMenuEx
LoadBitmapW
InvalidateRect
GetWindow
GetDlgCtrlID
MessageBoxA
IsIconic
DrawIcon
CreateWindowExW
GetWindowTextW
SendDlgItemMessageW
SetParent
ScreenToClient
ExitWindowsEx
GetKeyboardState
GetParent
CallNextHookEx
GetKeyState
UnhookWindowsHookEx
SetWindowsHookExW
ClientToScreen
SetForegroundWindow
SetActiveWindow
EndPaint
BeginPaint
GetMenu
GetMenuItemCount
DeleteMenu
GetForegroundWindow
EnableMenuItem
SetWindowPos
PostMessageW
RedrawWindow
InsertMenuW
IsWindowVisible
GetSystemMenu
DestroyIcon
SetMenuItemInfoW
CopyRect
GetSysColorBrush
GetWindowLongW
SetWindowLongW
CallWindowProcW
GetClassNameW
MapWindowPoints
GetMenuItemInfoW
FillRect
SetMenu
SystemParametersInfoW
TranslateAcceleratorW
RegisterWindowMessageW
LoadAcceleratorsW
EnumWindows
keybd_event
IsWindow
DrawTextW
OffsetRect
SetPropW
GetDC
GetSysColor
ReleaseDC
SendMessageW
SetTimer
KillTimer
EnableWindow
LoadImageW
GetSystemMetrics
wsprintfW
GetDlgItem
SetWindowTextW
ShowWindow
GetCursorPos
GetAsyncKeyState
CheckMenuItem
TrackPopupMenu
SendMessageTimeoutW
GetActiveWindow
MessageBoxW
GetClientRect
PostQuitMessage
LoadIconW
SetDlgItemTextW
CreatePopupMenu
GetWindowRect
AppendMenuW
gdi32
GetTextExtentPoint32W
CreateCompatibleBitmap
SetGraphicsMode
SetWorldTransform
StretchBlt
GetPixel
GetCurrentObject
SetPixel
CreateBitmap
CreatePatternBrush
OffsetWindowOrgEx
GetClipBox
ExtTextOutW
SetBkColor
SetTextColor
SetBkMode
CreateCompatibleDC
CreateSolidBrush
DeleteDC
GetStockObject
DeleteObject
SelectObject
GetObjectW
CreateFontIndirectW
GetDeviceCaps
comdlg32
GetOpenFileNameW
advapi32
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyW
RegSetValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
shell32
SHAppBarMessage
Shell_NotifyIconW
SHGetSpecialFolderPathW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ExtractIconExW
ShellExecuteExW
ShellExecuteW
comctl32
ImageList_Create
ImageList_Draw
ImageList_ReplaceIcon
ImageList_DrawEx
ole32
CoInitialize
oleaut32
SysAllocString
VariantInit
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SysFreeString
VariantClear
winmm
joyGetNumDevs
joyGetPos
joyGetPosEx
msvcp60
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??1_Lockit@std@@QAE@XZ
ws2_32
WSACleanup
WSAAccept
WSACloseEvent
WSAWaitForMultipleEvents
WSAEventSelect
WSACreateEvent
listen
bind
WSAGetLastError
WSASocketW
WSAStartup
htons
WSASend
WSARecv
inet_addr
htonl
closesocket
WSAEnumNetworkEvents
Sections
.text Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ