Static task
static1
Behavioral task
behavioral1
Sample
22f17a347c61b10cf5f53eae2f1f9fb0544efd150e45f52b276ea74f872210aa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
22f17a347c61b10cf5f53eae2f1f9fb0544efd150e45f52b276ea74f872210aa.exe
Resource
win10v2004-20240802-en
General
-
Target
22f17a347c61b10cf5f53eae2f1f9fb0544efd150e45f52b276ea74f872210aa
-
Size
1.8MB
-
MD5
ae10f433434c3824c4ff1997e5c4c18d
-
SHA1
85fcbe6054adc6b5a52e20b46b4ff4ae5ffa3074
-
SHA256
22f17a347c61b10cf5f53eae2f1f9fb0544efd150e45f52b276ea74f872210aa
-
SHA512
a8c725bf3c0d77c14b0a28409eff56f3cfe24bb0de5747e2dce6da8dd5ed2e0d72b8cd3aadc2eac9f1edcdc687208f7cadcc8284894949bab15d9660d9da2efb
-
SSDEEP
49152:CPPlF93Bov8gEUbGJvXknN2rpyFb4sCrtx:CFFFrkGJ2N2rkF8T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22f17a347c61b10cf5f53eae2f1f9fb0544efd150e45f52b276ea74f872210aa
Files
-
22f17a347c61b10cf5f53eae2f1f9fb0544efd150e45f52b276ea74f872210aa.exe windows:4 windows x86 arch:x86
ec62833f16b890c3b2ef033d5b25807e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
GetCPInfo
GetOEMCP
GetFileAttributesA
GetFileSize
GetFileTime
SetErrorMode
RtlUnwind
ExitProcess
TerminateProcess
GetCommandLineA
HeapFree
HeapAlloc
RaiseException
GetTimeZoneInformation
HeapReAlloc
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetProcessVersion
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
WritePrivateProfileStringA
GetProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
CreateFileA
GetCurrentProcess
DuplicateHandle
MulDiv
SetLastError
FormatMessageA
LocalFree
FileTimeToLocalFileTime
FileTimeToSystemTime
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
CreatePipe
GetStartupInfoA
CreateProcessA
GetLastError
CreateThread
CreateEventA
SetEvent
ReadFile
WaitForSingleObject
GetExitCodeProcess
CloseHandle
FindFirstFileA
FindClose
GetTempPathA
GetLongPathNameA
Sleep
DeleteFileA
GetModuleFileNameA
GetEnvironmentStrings
user32
GetClassNameA
PtInRect
GetSysColorBrush
InvalidateRect
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
LoadCursorA
SetForegroundWindow
GetWindow
SetWindowLongA
BeginPaint
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
LoadIconA
SendMessageA
AppendMenuA
GetSystemMenu
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
EnableWindow
IsIconic
CharUpperA
GrayStringA
DrawTextA
TabbedTextOutA
GetForegroundWindow
EndPaint
GetSystemMetrics
GetClientRect
DrawFocusRect
DefDlgProcA
InflateRect
CharNextA
IsWindowUnicode
DrawIcon
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
DestroyMenu
LoadStringA
ShowWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
SetWindowPos
gdi32
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
GetStockObject
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateDIBitmap
PatBlt
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateBitmap
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
shell32
ShellExecuteA
comctl32
ord17
oleaut32
VariantChangeType
SysAllocString
VariantCopy
VariantTimeToSystemTime
VariantClear
ws2_32
WSAStartup
WSACleanup
gethostbyname
socket
ntohl
recvfrom
closesocket
sendto
setsockopt
htonl
htons
Sections
.text Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ