Static task
static1
Behavioral task
behavioral1
Sample
23413bd03a16efc731e31d91d34cd6c2aece7ffcd9c2f681bd5e677bb7f6fa7bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
23413bd03a16efc731e31d91d34cd6c2aece7ffcd9c2f681bd5e677bb7f6fa7bN.exe
Resource
win10v2004-20240802-en
General
-
Target
23413bd03a16efc731e31d91d34cd6c2aece7ffcd9c2f681bd5e677bb7f6fa7bN
-
Size
1.6MB
-
MD5
ee2bd54de81f5cbca844b46984fc65e0
-
SHA1
48ea3d79d44d7357398e2330ba97c4253d15be4d
-
SHA256
23413bd03a16efc731e31d91d34cd6c2aece7ffcd9c2f681bd5e677bb7f6fa7b
-
SHA512
46b79684a145e37901b0f4c2689ef607fa8bec001d553ba2b12c2145ec6a9fa6e2f07d5ebd3b57f49443e0df2745a777dce2fd23fde521e1d3a0831ab6df7ca8
-
SSDEEP
24576:U1z6wTvZFwje38yTnK06uIlezUB1jBPK4pABCsMivaVq:U1z9bfwL68uI8kCQABCsYq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23413bd03a16efc731e31d91d34cd6c2aece7ffcd9c2f681bd5e677bb7f6fa7bN
Files
-
23413bd03a16efc731e31d91d34cd6c2aece7ffcd9c2f681bd5e677bb7f6fa7bN.exe windows:4 windows x86 arch:x86
2c579cb635914a2a478a51090a2a104d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_DrawEx
ImageList_EndDrag
ImageList_GetBkColor
ImageList_GetDragImage
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_Read
ImageList_Remove
ImageList_Replace
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_SetDragCursorImage
ImageList_SetIconSize
ImageList_SetImageCount
ImageList_Write
ord17
ImageList_BeginDrag
ImageList_Create
ImageList_Add
ImageList_Destroy
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
OpenProcess
QueryPerformanceFrequency
RaiseException
ReadFile
ReadProcessMemory
ResetEvent
ResumeThread
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
MultiByteToWideChar
SetLastError
SetThreadLocale
SetThreadPriority
SizeofResource
Sleep
SuspendThread
SystemTimeToFileTime
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
GetModuleHandleW
TerminateProcess
GetCurrentProcess
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapFree
GetOEMCP
MulDiv
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpA
LockResource
LocalFree
LocalFileTimeToFileTime
LocalAlloc
LoadResource
LoadLibraryExA
LeaveCriticalSection
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalFree
GlobalFindAtomA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVersionExA
GetThreadLocale
GetTempPathA
GetSystemInfo
GetSystemDirectoryA
GetStringTypeExA
GetStdHandle
GetStartupInfoA
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
GetLocaleInfoA
GetLastError
GetFullPathNameA
GetFileSize
GetFileAttributesA
GetExitCodeThread
GetDiskFreeSpaceA
GetDateFormatA
GetCPInfo
GetCommandLineA
GetACP
FreeResource
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
EnumCalendarInfoA
EnterCriticalSection
RtlUnwind
DuplicateHandle
DeleteFileA
DeleteCriticalSection
CreateThread
CreateFileA
CreateEventA
CreateDirectoryA
CompareStringA
CloseHandle
ExitProcess
GetCurrentProcessId
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
GetVersion
LoadLibraryA
HeapAlloc
HeapReAlloc
GetStringTypeA
GetStringTypeW
LCMapStringA
SetFileTime
LCMapStringW
user32
OffsetRect
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
PtInRect
RedrawWindow
RegisterClassA
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropA
ScreenToClient
ScrollWindow
SendMessageA
SetActiveWindow
SetCapture
SetClassLongA
SetClipboardData
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemInfoA
SetParent
SetPropA
SetRect
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowsHookExA
SetWindowTextA
ShowCursor
ShowOwnedPopups
ShowScrollBar
ShowWindow
SystemParametersInfoA
SystemParametersInfoW
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UpdateWindow
WaitMessage
WindowFromDC
WindowFromPoint
WinHelpA
IsDialogMessageA
IsChild
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
InflateRect
GetWindowThreadProcessId
GetWindowTextW
GetWindowTextLengthW
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindowDC
OemToCharA
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
MessageBoxIndirectA
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetParent
GetMenuStringA
GetMenuState
GetMenuItemRect
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetLastActivePopup
GetKeyState
GetKeyNameTextA
GetKeyboardType
GetKeyboardState
GetKeyboardLayoutList
GetIconInfo
GetForegroundWindow
GetFocus
GetDlgCtrlID
GetDesktopWindow
GetDCEx
GetCursorPos
GetClipboardData
GetClientRect
GetClassNameA
GetClassLongA
GetClassInfoA
GetCapture
GetActiveWindow
FrameRect
FindWindowExA
FindWindowA
FillRect
EqualRect
EnumWindows
EnumThreadWindows
EnumChildWindows
EndPaint
EnableWindow
EnableScrollBar
EnableMenuItem
EmptyClipboard
DrawTextA
DrawMenuBar
DrawIconEx
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreateWindowExA
CreatePopupMenu
CreateMenu
CreateIconIndirect
CopyRect
CopyImage
CopyIcon
CloseClipboard
MsgWaitForMultipleObjects
GetTopWindow
MoveWindow
ClientToScreen
CheckMenuItem
CharUpperBuffA
CharToOemA
CharPrevA
CharNextA
CharLowerBuffA
CharLowerA
MessageBoxA
MessageBeep
MapWindowPoints
MapVirtualKeyA
LoadStringA
LoadKeyboardLayoutA
LoadImageA
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsRectEmpty
GetSubMenu
IsIconic
CallWindowProcA
CallNextHookEx
BeginPaint
AdjustWindowRectEx
ActivateKeyboardLayout
GetMessagePos
gdi32
CreateDIBitmap
CreateDIBSection
CreateFontIndirectA
CreateFontIndirectW
CreateHalftonePalette
CreatePalette
CreatePenIndirect
CreateRectRgn
CreateRoundRectRgn
CreateSolidBrush
DeleteDC
DeleteEnhMetaFile
DeleteObject
ExcludeClipRect
ExtTextOutA
GdiFlush
GetBitmapBits
GetBitmapDimensionEx
GetBrushOrgEx
GetClipBox
GetCurrentPositionEx
GetDCOrgEx
GetDeviceCaps
CreateCompatibleDC
GetDIBits
CreateCompatibleBitmap
GetEnhMetaFileHeader
GetEnhMetaFilePaletteEntries
GetObjectA
GetPaletteEntries
GetPixel
GetRgnBox
GetStockObject
GetSystemPaletteEntries
GetTextExtentPoint32A
GetTextExtentPointA
GetTextMetricsA
GetViewportOrgEx
GetWindowOrgEx
GetWinMetaFileBits
IntersectClipRect
LineTo
MaskBlt
MoveToEx
PatBlt
PlayEnhMetaFile
Polygon
Polyline
RealizePalette
Rectangle
RectVisible
RestoreDC
RoundRect
SaveDC
SelectClipRgn
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetBrushOrgEx
SetDIBColorTable
SetEnhMetaFileBits
SetPixelV
SetROP2
SetStretchBltMode
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
SetWinMetaFileBits
StretchBlt
UnrealizeObject
CreateBrushIndirect
CreateBitmap
GetEnhMetaFileBits
CopyEnhMetaFileA
CombineRgn
GetDIBColorTable
Arc
BitBlt
advapi32
RegFlushKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
shell32
ShellExecuteA
SHGetFileInfoA
ole32
CoCreateGuid
CoTaskMemFree
CoUninitialize
OleInitialize
OleUninitialize
StringFromCLSID
CoInitialize
oleaut32
VariantCopyInd
VariantClear
VariantChangeType
SysReAllocStringLen
SysFreeString
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayCreate
SafeArrayAccessData
GetErrorInfo
VariantInit
ws2_32
WSACancelAsyncRequest
WSACleanup
WSAGetLastError
WSAStartup
WSAAsyncGetHostByName
ioctlsocket
inet_ntoa
inet_addr
htons
closesocket
socket
shutdown
setsockopt
send
recv
listen
ntohs
Sections
.text Size: 444KB - Virtual size: 444KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 14.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ultra0 Size: 636KB - Virtual size: 636KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 527KB - Virtual size: 527KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ