Static task
static1
Behavioral task
behavioral1
Sample
c37e5d4992c155fa8cb7158e231650274423b63107c7022937feb0c44f27e39f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c37e5d4992c155fa8cb7158e231650274423b63107c7022937feb0c44f27e39f.exe
Resource
win10v2004-20240802-en
General
-
Target
c37e5d4992c155fa8cb7158e231650274423b63107c7022937feb0c44f27e39f
-
Size
1.3MB
-
MD5
ad353e480fe8ca8cbecf8c9dbfcf7fac
-
SHA1
65f0e3b36ef5f3e170758b24c5d898229dffbe4b
-
SHA256
c37e5d4992c155fa8cb7158e231650274423b63107c7022937feb0c44f27e39f
-
SHA512
ea7ff9076f04a6c9e9bea93a69fe82a1c995b22e726fc1251a77f3914fcdb05afb4c6c1a88ca171270380611649316ec38fdcd3763a7ae9cbd230019c49a5e0a
-
SSDEEP
24576:8IXgCWSpRyndSJVDsVu5unzqWvX12t/sBlDqgZQd6XKtiMJYiPUp:/WSjaSJlsQuzqW/1c/snji6attJM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c37e5d4992c155fa8cb7158e231650274423b63107c7022937feb0c44f27e39f
Files
-
c37e5d4992c155fa8cb7158e231650274423b63107c7022937feb0c44f27e39f.exe windows:6 windows x86 arch:x86
6fe2f907eca9dbc413e5e0339b4fd597
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CLSIDFromString
StringFromGUID2
IIDFromString
OleRun
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
shell32
Shell_NotifyIconA
ShellExecuteA
SHGetFolderPathW
wininet
InternetReadFile
InternetTimeToSystemTime
InternetCrackUrlA
InternetTimeFromSystemTime
InternetOpenA
InternetCloseHandle
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetErrorDlg
user32
SetWindowLongA
LoadImageA
GetDesktopWindow
GetWindowLongA
GetCursorPos
MessageBoxW
SetForegroundWindow
wsprintfA
CharNextA
LoadStringA
GetMessageA
GetMessageW
TranslateMessage
DispatchMessageA
DispatchMessageW
PeekMessageA
PostMessageA
DefWindowProcA
PostQuitMessage
RegisterClassA
CreateWindowExA
DestroyWindow
ShowWindow
MsgWaitForMultipleObjectsEx
IsWindowUnicode
GetSystemMetrics
CreatePopupMenu
AppendMenuA
TrackPopupMenu
version
VerQueryValueW
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GetDriveTypeW
VirtualQuery
VirtualProtect
VirtualAlloc
GetSystemInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetFileType
GetSystemTimeAsFileTime
GetModuleHandleW
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringEx
EncodePointer
InitializeCriticalSectionEx
GetStringTypeW
GetConsoleOutputCP
GetConsoleMode
GetFileInformationByHandle
GetStdHandle
GetModuleFileNameW
InitializeSListHead
WriteConsoleW
GetFullPathNameW
CreateDirectoryW
GetCommandLineA
DecodePointer
CloseHandle
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WaitForSingleObject
CreateMutexA
CreateEventA
WaitForMultipleObjects
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryExA
LoadResource
SizeofResource
lstrcmpA
lstrcmpiA
lstrcatA
lstrlenA
FindResourceA
SetDllDirectoryA
SystemTimeToTzSpecificLocalTime
MultiByteToWideChar
WideCharToMultiByte
IsDBCSLeadByte
ResetEvent
CreateThread
lstrcpyA
lstrcpynA
CreateFileA
WriteFile
OpenEventA
Sleep
DeleteFileA
GetTempPathA
GetCurrentProcess
GetVersionExA
LocalFree
ReadFile
FileTimeToSystemTime
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
FormatMessageW
GetEnvironmentVariableA
FindClose
ExitProcess
TerminateProcess
GetSystemDirectoryA
LockResource
LoadLibraryA
LocalAlloc
FormatMessageA
GetCommandLineW
SetLastError
GetNativeSystemInfo
GetModuleHandleExW
SetHandleInformation
CreatePipe
PeekNamedPipe
GetExitCodeProcess
CreateProcessA
SetEndOfFile
SetFilePointerEx
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
GetFileAttributesA
GetModuleHandleExA
LoadLibraryW
SetStdHandle
LoadLibraryExW
OpenMutexA
QueryPerformanceCounter
CreateFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
OutputDebugStringW
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
GetTimeZoneInformation
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetFileSizeEx
ReadConsoleW
GetCurrentDirectoryW
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetEvent
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyA
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
RegQueryValueExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExA
RegQueryInfoKeyW
RegOpenKeyExA
RegNotifyChangeKeyValue
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
oleaut32
VariantChangeType
GetErrorInfo
SysFreeString
VarUI4FromStr
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VariantInit
VariantClear
shlwapi
ord12
gdi32
GetStockObject
crypt32
CryptUnprotectData
CryptProtectData
CryptStringToBinaryA
CryptBinaryToStringA
msi
ord117
ord189
ord31
ord159
ord160
ord91
ord115
ord44
ord204
ord168
ord137
ord141
ord8
ord67
Sections
.text Size: 436KB - Virtual size: 435KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE