Static task
static1
Behavioral task
behavioral1
Sample
030c641b90b1f5465f6465eb3431623711e067b82daee91627fa058340a25551.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
030c641b90b1f5465f6465eb3431623711e067b82daee91627fa058340a25551.exe
Resource
win10v2004-20240802-en
General
-
Target
030c641b90b1f5465f6465eb3431623711e067b82daee91627fa058340a25551
-
Size
12.2MB
-
MD5
e2faacc1ace7b4263d64b183b05af494
-
SHA1
c0031dff74a4c6cc2606202f0c0d82205d918a29
-
SHA256
030c641b90b1f5465f6465eb3431623711e067b82daee91627fa058340a25551
-
SHA512
700fd2049abd1fc3ad43a61d2b7fdb36853d1e09293a4e34b0a7de6e70398ef5c99c0cc2656c2e89101e52227e14ac816fa8e0c0c3824ebaaf47ad9c3ab8be60
-
SSDEEP
3072:exIVhSVlCxqTnHxRi2rS2u9nXaMpw1fsxstIa5JIHEOT6RxAcI:zhSPCkTnHn5rS2L8IpfIH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 030c641b90b1f5465f6465eb3431623711e067b82daee91627fa058340a25551
Files
-
030c641b90b1f5465f6465eb3431623711e067b82daee91627fa058340a25551.exe windows:4 windows x86 arch:x86
ba39c6f2e7ad05083b9aabc73968bd46
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToSystemTime
FileTimeToLocalFileTime
SetErrorMode
RtlUnwind
HeapFree
HeapAlloc
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
GetACP
SetStdHandle
GetFileType
GetTimeZoneInformation
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sleep
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileTime
GetProfileStringA
InterlockedExchange
GetFileSize
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
FindFirstFileA
FindClose
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
SizeofResource
GlobalFlags
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
EnterCriticalSection
lstrcpynA
GetLastError
WaitForSingleObject
CloseHandle
GetModuleFileNameA
GlobalAlloc
lstrcmpA
GetCurrentThread
FormatMessageA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
MulDiv
SetLastError
LoadLibraryA
FreeLibrary
GetVersion
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
GlobalLock
VirtualAlloc
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
lstrcatA
lstrlenA
WinExec
lstrcpyA
IsBadWritePtr
user32
GetFocus
DispatchMessageA
PeekMessageA
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
PostMessageA
IsDialogMessageA
SetWindowTextA
ShowWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
PostQuitMessage
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
WindowFromPoint
GetClassNameA
GetSysColorBrush
DestroyMenu
LoadStringA
CharUpperA
IsWindowVisible
WinHelpA
wsprintfA
GetClassInfoA
SetFocus
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowPos
RegisterWindowMessageA
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetNextDlgTabItem
EndDialog
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
MessageBeep
GetDC
ReleaseDC
SetWindowLongA
LoadIconA
MessageBoxA
GrayStringA
DrawTextA
TabbedTextOutA
SetCursor
GetWindowLongA
CopyRect
FrameRect
InflateRect
FillRect
GetSysColor
OffsetRect
DrawFocusRect
SendMessageA
LoadCursorA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
GetActiveWindow
GetParent
GetCapture
SetCapture
GetClientRect
PtInRect
ReleaseCapture
InvalidateRect
LoadImageA
RedrawWindow
AdjustWindowRectEx
ScreenToClient
RegisterClassA
DestroyCursor
EnableWindow
DefDlgProcA
CharNextA
IsWindowUnicode
DrawStateA
GetWindowRect
GetTopWindow
gdi32
GetStockObject
CreateFontIndirectA
GetObjectA
GetClipBox
SetTextColor
SetBkColor
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
Escape
LineTo
GetDeviceCaps
CreatePen
CreateSolidBrush
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteObject
GetTextExtentPoint32A
MoveToEx
CreateDIBitmap
PatBlt
GetTextExtentPointA
CreateFontA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueA
shell32
ShellExecuteA
comctl32
ord17
wininet
InternetSetOptionExA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetOpenA
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenUrlA
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12.0MB - Virtual size: 12.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ