Static task
static1
Behavioral task
behavioral1
Sample
443e6b2cda304f2ad9c74ff308ee3cb88af898d80e5db13db49e60481400aa5a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
443e6b2cda304f2ad9c74ff308ee3cb88af898d80e5db13db49e60481400aa5a.exe
Resource
win10v2004-20240802-en
General
-
Target
443e6b2cda304f2ad9c74ff308ee3cb88af898d80e5db13db49e60481400aa5a
-
Size
1.8MB
-
MD5
40afa70949fff379bef279290c19ff3e
-
SHA1
f639396c03cf7aeaa5e2fcdd7b4f00d82de0907c
-
SHA256
443e6b2cda304f2ad9c74ff308ee3cb88af898d80e5db13db49e60481400aa5a
-
SHA512
f5da74bfa43681b49a466d303f25d844a76a5323693faeb1061f95a2a6de81ac9f0e585ae66b3d4ddf0de3a4af4a5df955508be751f65bd82ec93d99ad7ccf79
-
SSDEEP
24576:zHjdb/4CyFcgsw/gRofI35Nn2BldhTeWcjQy7f8Yhd3XWJtKFMUaNUzsJb0Yc:p/4qw/dfIznulaWUQef8UVXQtWYJbF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 443e6b2cda304f2ad9c74ff308ee3cb88af898d80e5db13db49e60481400aa5a
Files
-
443e6b2cda304f2ad9c74ff308ee3cb88af898d80e5db13db49e60481400aa5a.exe windows:4 windows x86 arch:x86
1eebec5d34421bf073216233347a1828
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLocalTime
LocalFileTimeToFileTime
GetDateFormatW
GetTimeFormatW
GetCommandLineW
CreateThread
TerminateThread
GetFileAttributesW
SetErrorMode
GetFileSize
FindClose
FindFirstFileW
CreateFileW
GetCurrentDirectoryW
GetTempPathW
ExpandEnvironmentStringsW
GetSystemDirectoryW
GetWindowsDirectoryW
GetTempFileNameW
SetFileAttributesW
CreateDirectoryW
MoveFileW
FindNextFileW
WritePrivateProfileStringW
GetShortPathNameW
MoveFileExW
RemoveDirectoryW
DeleteFileW
ReadFile
WriteFile
FlushFileBuffers
UnmapViewOfFile
SetFilePointer
GetFileInformationByHandle
DeviceIoControl
SetEndOfFile
MapViewOfFile
CreateFileMappingW
OpenFileMappingW
SetFileTime
GetModuleFileNameW
LocalFree
LocalAlloc
SizeofResource
MulDiv
GetSystemDefaultLangID
GetUserDefaultLangID
GetSystemTime
FreeLibrary
GetProcAddress
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetCommTimeouts
SetupComm
GetCommTimeouts
GetCommState
SetCommState
SetLastError
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetVersionExW
SetUnhandledExceptionFilter
GetThreadSelectorEntry
GetCurrentProcessId
GetVersionExA
CreateEventW
SetEvent
ResetEvent
WaitForMultipleObjectsEx
GetPrivateProfileStringW
GetPrivateProfileStructW
WritePrivateProfileStructW
QueryPerformanceFrequency
QueryPerformanceCounter
GetVolumeInformationW
GetEnvironmentVariableW
GetModuleFileNameA
lstrcpyA
GetTimeZoneInformation
GetVersion
SetFileAttributesA
CreateFileA
GetVolumeInformationA
GetFullPathNameA
FindFirstFileA
FindNextFileA
SetVolumeLabelA
lstrlenA
GetDriveTypeA
GetLocaleInfoA
GetFileAttributesA
GetFileTime
FileTimeToDosDateTime
RtlUnwind
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
RaiseException
TlsSetValue
TlsAlloc
TlsGetValue
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
SetHandleCount
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
CompareStringA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
IsBadReadPtr
IsBadCodePtr
LoadLibraryA
SetStdHandle
SetEnvironmentVariableA
SystemTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindResourceExW
LoadResource
LockResource
GetLocaleInfoW
FormatMessageW
GetCurrentThreadId
GetTickCount
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
CreateProcessW
CloseHandle
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
GetThreadLocale
GetStringTypeExW
CompareStringW
MultiByteToWideChar
GetLastError
GetProcessHeap
DeleteFileA
CreateDirectoryA
GetCurrentDirectoryA
FreeConsole
Sleep
GetModuleHandleW
lstrlenW
LoadLibraryW
user32
DeleteMenu
GetMenuItemInfoW
SetMenu
GetMenuItemCount
SetMenuInfo
FillRect
ReleaseDC
GetDC
OffsetRect
GetWindowDC
GetDlgCtrlID
FindWindowExW
DrawFrameControl
IsZoomed
RegisterClassW
DrawFocusRect
DrawIconEx
RegisterWindowMessageW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
AdjustWindowRectEx
LoadIconW
MsgWaitForMultipleObjectsEx
DispatchMessageW
TranslateMessage
MsgWaitForMultipleObjects
UnhookWindowsHookEx
LoadBitmapW
WindowFromPoint
RegisterClipboardFormatW
CreateIconIndirect
DrawEdge
GetWindowTextLengthW
CopyRect
DrawMenuBar
RemoveMenu
LoadAcceleratorsW
IsDialogMessageW
TranslateAcceleratorW
TranslateMDISysAccel
GetMessageW
DefFrameProcW
OemToCharA
CharToOemA
CreateDialogIndirectParamW
CreateDialogParamW
DialogBoxIndirectParamW
DialogBoxParamW
LoadStringW
SetClassLongW
GetMenu
InsertMenuItemW
GetFocus
IsWindow
SetWindowPlacement
GetWindowPlacement
MessageBoxW
PeekMessageW
PostQuitMessage
GetParent
ScreenToClient
IsDlgButtonChecked
CheckDlgButton
IsWindowEnabled
EnableWindow
GetDlgItem
MapWindowPoints
GetDlgItemInt
GetDlgItemTextW
SetDlgItemInt
SendDlgItemMessageW
SetCursor
SetWindowTextW
GetSystemMetrics
LoadImageW
SetWindowLongW
GetSysColor
GetKeyState
SendMessageW
MapDialogRect
SetWindowPos
DestroyIcon
CharNextW
DefWindowProcW
EndPaint
DrawTextW
FrameRect
GetSysColorBrush
BeginPaint
GetWindowLongW
CreateWindowExW
LoadMenuIndirectW
RemovePropW
SetForegroundWindow
PostMessageW
SystemParametersInfoW
GetWindowRect
DrawAnimatedRects
IsWindowVisible
MoveWindow
SetFocus
KillTimer
SetTimer
GetClientRect
ShowWindow
InvalidateRect
UpdateWindow
LoadCursorW
RegisterClassExW
SetMenuDefaultItem
SetMenuItemInfoW
CheckMenuItem
EnableMenuItem
GetMenuState
TrackPopupMenu
DestroyMenu
GetForegroundWindow
CreatePopupMenu
LoadMenuW
GetSubMenu
CallWindowProcW
GetPropW
SetPropW
PtInRect
GetMessagePos
GetDoubleClickTime
GetWindowTextW
GetCapture
ReleaseCapture
InflateRect
SetCapture
GetCursorPos
EndDialog
DestroyWindow
SetDlgItemTextW
gdi32
GetDIBits
SetBkMode
SetTextColor
CreatePen
SelectObject
Polyline
DeleteObject
CreateFontW
RestoreDC
GetTextExtentPoint32W
SetBkColor
RoundRect
SetPolyFillMode
GetTextFaceW
GetTextMetricsW
SaveDC
CreateFontIndirectW
GetObjectW
EnumFontFamiliesExW
GetDeviceCaps
TextOutW
GetBkColor
DeleteDC
CreateCompatibleBitmap
CreateDIBSection
CreateCompatibleDC
BitBlt
StretchBlt
SetStretchBltMode
Ellipse
GetPixel
Rectangle
SetROP2
CreateHatchBrush
GetTextColor
Polygon
ExcludeClipRect
CreateSolidBrush
PolyPolyline
GetStockObject
comctl32
ImageList_Destroy
ImageList_GetIcon
ImageList_GetImageCount
ImageList_DrawEx
ImageList_Draw
ord17
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Create
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetTime
PlaySoundW
comdlg32
GetOpenFileNameW
CommDlgExtendedError
GetSaveFileNameW
advapi32
QueryServiceStatus
RegCreateKeyExW
RegSetKeySecurity
RegCloseKey
EnumDependentServicesW
StartServiceW
OpenServiceW
ControlService
OpenSCManagerW
CloseServiceHandle
GetUserNameW
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyW
CryptDecrypt
CryptDeriveKey
CryptEncrypt
CryptDestroyKey
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptAcquireContextW
CryptReleaseContext
RegEnumValueW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegDeleteValueW
shell32
Shell_NotifyIconW
SHGetFileInfoW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteExW
DragQueryFileW
ole32
CLSIDFromProgID
OleRun
CLSIDFromString
StringFromGUID2
CoTaskMemAlloc
CoInitialize
ReleaseStgMedium
CreateStreamOnHGlobal
CoUninitialize
OleSave
OleSetMenuDescriptor
OleSetContainedObject
CoCreateInstance
CoCreateGuid
CoTaskMemFree
OleDraw
oleaut32
SysFreeString
VariantClear
SafeArrayPtrOfIndex
VariantInit
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SysAllocString
ws2_32
WSACleanup
WSAStartup
inet_ntoa
WSAAddressToStringW
Sections
.text Size: 476KB - Virtual size: 473KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ