Static task
static1
Behavioral task
behavioral1
Sample
24b5c82437b4c0f85433db1c3c45b940N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24b5c82437b4c0f85433db1c3c45b940N.exe
Resource
win10v2004-20240802-en
General
-
Target
24b5c82437b4c0f85433db1c3c45b940N.exe
-
Size
1014KB
-
MD5
24b5c82437b4c0f85433db1c3c45b940
-
SHA1
9dcc1e6cac3959798c505df2952650c831b4cecc
-
SHA256
20dbd0cb20c95a423fa93551dc192a76b9452ab58414039755984c14c5246474
-
SHA512
88539f5827e4dd1532e8bfcd6145d2c830c1e44dc0c363e5efa471b3b43086dd34aee30806031b8e32a025976601466eba6badc751043d88495ebebbc8cf3d3d
-
SSDEEP
12288:/IP4K+ug4fA9ra2xoGspxDRyL0gSHUufXevaXCGHZDdkGj0VESWlZII4pLm2jBs9:QPnZfsdxOt7gS0ufXeyyGHrkzWPy49
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24b5c82437b4c0f85433db1c3c45b940N.exe
Files
-
24b5c82437b4c0f85433db1c3c45b940N.exe.exe windows:4 windows x86 arch:x86
4c54c6aadd654bd4c484cb821063b59c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadReadPtr
GlobalUnlock
GlobalLock
MulDiv
lstrcpyA
EnumResourceLanguagesA
ConvertDefaultLocale
lstrcmpA
GlobalDeleteAtom
FreeResource
GlobalAddAtomA
lstrcmpW
lstrcatA
GlobalFindAtomA
GlobalGetAtomNameA
GlobalReAlloc
GlobalHandle
LocalReAlloc
TlsFree
GlobalFlags
LockFile
UnlockFile
GetCPInfo
GetOEMCP
SetErrorMode
GetFileTime
RtlUnwind
DeviceIoControl
TerminateProcess
VirtualQuery
HeapReAlloc
GetStartupInfoA
GetCommandLineA
ExitThread
GetDriveTypeA
GetSystemTimeAsFileTime
GetFileType
HeapSize
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetStdHandle
GetStringTypeA
GetStringTypeW
IsBadCodePtr
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
GetVolumeInformationA
SetLastError
VirtualProtectEx
VirtualAllocEx
CreateRemoteThread
ReadProcessMemory
VirtualFreeEx
DosDateTimeToFileTime
SetFileTime
CreateJobObjectA
AssignProcessToJobObject
OpenEventA
OpenMutexA
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CreateThread
WaitForMultipleObjects
ResetEvent
GetProcessId
QueryInformationJobObject
GetProcessTimes
GetExitCodeProcess
TerminateJobObject
OpenProcess
OpenThread
WritePrivateProfileStringA
WriteProcessMemory
GetFullPathNameA
TlsAlloc
ResumeThread
TlsSetValue
TlsGetValue
FlushFileBuffers
MoveFileA
CopyFileA
LocalFileTimeToFileTime
SetFileAttributesA
DeleteFileA
FindNextFileA
GetFileAttributesExA
GetCurrentDirectoryA
SetThreadAffinityMask
QueryPerformanceCounter
QueryPerformanceFrequency
DebugBreak
DuplicateHandle
CreateDirectoryA
FindFirstFileA
GetWindowsDirectoryA
LocalAlloc
LocalFree
FormatMessageA
FileTimeToSystemTime
CreateEventA
SetEndOfFile
SetFilePointer
WriteFile
SetEvent
TerminateThread
GetSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
IsDBCSLeadByte
InterlockedIncrement
lstrcpynA
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
LoadLibraryExA
FindResourceA
LockResource
SizeofResource
CreateMutexA
lstrlenW
FindResourceExA
LoadResource
ReleaseMutex
GlobalAlloc
ReadFile
GlobalFree
WideCharToMultiByte
GetFileAttributesW
CreateFileW
GetFileSize
GetProcessHeap
HeapAlloc
GetPrivateProfileStringW
HeapFree
GetModuleFileNameW
FindFirstFileW
FindNextFileW
FindClose
GetUserDefaultLCID
GetUserGeoID
GetUserDefaultUILanguage
GetSystemDefaultLangID
GetLocaleInfoW
GetNumberFormatW
GetDateFormatW
LoadLibraryW
FreeLibrary
GetCurrentProcessId
GetModuleFileNameA
GetPrivateProfileStringA
lstrlenA
MultiByteToWideChar
GetLastError
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
WaitForSingleObject
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
LoadLibraryA
GetTickCount
GetCurrentThread
GetThreadContext
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
GetModuleHandleA
GetProcAddress
GetCurrentProcess
CreateFileA
GetCurrentThreadId
CreateProcessA
CloseHandle
GetFileAttributesA
DeleteCriticalSection
InitializeCriticalSection
ExitProcess
RaiseException
user32
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
RemovePropA
IsChild
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
GetSysColor
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
CopyRect
RegisterWindowMessageA
RegisterClipboardFormatA
GetWindow
SetWindowContextHelpId
MapDialogRect
SetMenuItemBitmaps
UnregisterClassA
IntersectRect
GetSysColorBrush
GetSystemMetrics
SetFocus
SetForegroundWindow
AttachThreadInput
GetWindowThreadProcessId
ModifyMenuA
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
UnhookWindowsHookEx
GetWindowTextA
GetFocus
SetWindowPos
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
IsRectEmpty
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
PostThreadMessageA
GetMenuItemID
GetSubMenu
PostQuitMessage
FindWindowExA
SetWindowPlacement
WaitForInputIdle
GetWindowPlacement
GetForegroundWindow
GetWindowRect
MoveWindow
SystemParametersInfoA
PostMessageA
wsprintfA
CharLowerBuffW
PtInRect
OffsetRect
GetCursorPos
SetCapture
ReleaseCapture
IsWindow
SetCursor
LoadCursorA
MessageBoxW
CharLowerBuffA
LoadIconA
SetRect
EnableMenuItem
GetMenuItemCount
InsertMenuA
SendMessageA
GetSystemMenu
IsIconic
SetWindowRgn
GetClientRect
InvalidateRect
SetTimer
EnableWindow
CharUpperA
CharNextA
ReleaseDC
GetDC
ChangeDisplaySettingsA
EnumWindows
GetClassNameA
FindWindowA
ShowWindow
GetLastInputInfo
IsWindowVisible
GetParent
MessageBoxA
GetPropA
gdi32
GetRgnBox
GetTextColor
GetBkColor
GetMapMode
CreateRectRgnIndirect
GetStockObject
DeleteDC
ExtSelectClipRgn
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetObjectA
SetBkColor
SetTextColor
CreateRoundRectRgn
CreateRectRgn
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
GetClipBox
CreateBitmap
SetViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
CryptDestroyHash
CryptReleaseContext
GetUserNameA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
RegCloseKey
CryptSetKeyParam
CryptDeriveKey
CryptHashData
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegOpenKeyExW
RegQueryValueExW
CryptDestroyKey
RegSetKeySecurity
RevertToSelf
ImpersonateSelf
CryptDecrypt
CryptAcquireContextW
CryptCreateHash
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
SHFileOperationA
comctl32
ord17
shlwapi
PathRemoveFileSpecA
PathStripPathA
PathAppendA
PathAppendW
PathRemoveFileSpecW
PathUnquoteSpacesW
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFileExistsA
oledlg
ord8
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
CoCreateInstance
CoInitializeSecurity
CoSetProxyBlanket
CoInitialize
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CoInitializeEx
CreateILockBytesOnHGlobal
CoUninitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
StringFromCLSID
CoCreateGuid
CLSIDFromString
oleaut32
SysAllocString
SysFreeString
SysStringLen
VariantClear
VariantInit
DispCallFunc
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
VariantChangeType
SysAllocStringByteLen
SysStringByteLen
VariantCopy
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
SafeArrayCreate
SafeArrayDestroy
SystemTimeToVariantTime
OleCreateFontIndirect
urlmon
URLDownloadToCacheFileA
ws2_32
gethostname
gethostbyname
ntohl
WSACleanup
WSAStartup
crypt32
CertFreeCertificateContext
CertNameToStrA
CryptMsgGetAndVerifySigner
CryptQueryObject
CryptMsgClose
wintrust
WinVerifyTrust
wininet
InternetCloseHandle
HttpAddRequestHeadersA
InternetGetLastResponseInfoA
InternetReadFile
InternetQueryOptionA
HttpSendRequestA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpQueryInfoA
winmm
timeGetTime
PlaySoundA
iphlpapi
GetAdaptersInfo
dinput8
DirectInput8Create
version
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 498KB - Virtual size: 498KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.pecode Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pccode Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.phs Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ