Static task
static1
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20241007-en
General
-
Target
build.exe
-
Size
1.6MB
-
MD5
0a8711fa1cb4189ab364c217db5f3620
-
SHA1
94ee709ab608d9d4ed6143a1deae85dd9fd812b3
-
SHA256
437c785b2093ffb955f17d63758cfb10e741509415cc55de8050e2d918716a4a
-
SHA512
8176f9534103704ef3b28ed2c5ab5f79cc7a19ee535017a763727b365d7825d3bb2ddf9a9fc3eae13eac4e3cfa95ce6887362d564db2c0440d0dab5cfdb1ebab
-
SSDEEP
24576:Y/WWf67etHLvLdh+dLNuK5imSFRWct3BfA59jACSr6ggTan9mTYdGvhH0WygS:Uf66tXdh+147YcXIfUCc6bG9DgS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource build.exe
Files
-
build.exe.exe windows:4 windows x86 arch:x86
ed794b16380bcc81cb03fc61693c9d94
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
CreateThread
TerminateThread
FindFirstFileW
FindClose
FormatMessageW
GetEnvironmentVariableW
GetComputerNameW
GetLocaleInfoW
Sleep
LocalFree
CreateMutexW
MulDiv
lstrcpynW
OutputDebugStringA
GetLocalTime
GetPrivateProfileStringW
WritePrivateProfileStringW
CreateDirectoryW
GetUserDefaultLangID
GetFileAttributesW
InitializeCriticalSection
DeleteCriticalSection
GlobalHandle
FreeResource
DeleteFileW
lstrcmpW
lstrcatW
CopyFileW
GetTempPathW
GetTimeZoneInformation
GetModuleFileNameW
GetModuleHandleW
GetCurrentThreadId
GetVersionExW
GlobalReAlloc
FindResourceW
LoadResource
LockResource
FreeLibrary
LoadLibraryW
GetProcAddress
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetLastError
WriteFile
CreateFileW
GetFileSize
ReadFile
CloseHandle
OutputDebugStringW
lstrcmpiW
GlobalSize
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
EnterCriticalSection
LeaveCriticalSection
lstrlenW
GetCurrentProcess
FlushInstructionCache
lstrcpyW
InterlockedExchange
user32
GetWindowRect
IsWindowVisible
FindWindowExW
PtInRect
GetCursorPos
ScreenToClient
GetWindowTextW
GetDlgCtrlID
GetScrollPos
SetWindowTextW
GetKeyState
SetFocus
LoadCursorW
SendMessageW
RegisterClassExW
CreateWindowExW
LoadImageW
GetWindowLongW
GetSysColor
DefWindowProcW
CallWindowProcW
SetMenuItemInfoW
EndDialog
SystemParametersInfoW
CharNextW
EnumClipboardFormats
GetClipboardFormatNameW
GetClipboardData
MessageBoxW
RegisterClipboardFormatW
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SetWindowLongW
EnumChildWindows
CharLowerW
SetParent
CopyRect
DestroyWindow
PostQuitMessage
KillTimer
GetActiveWindow
SetTimer
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
CreateDialogParamW
GetSystemMetrics
MapWindowPoints
GetSysColorBrush
ReleaseDC
GetDC
GetClientRect
GetDlgItem
LoadBitmapW
SetWindowPos
ShowWindow
IsDialogMessageW
GetParent
IsChild
GetFocus
TrackPopupMenuEx
DestroyMenu
GetWindow
CreateDialogIndirectParamW
GetClassInfoExW
RegisterWindowMessageW
GetWindowTextLengthW
EndPaint
FillRect
BeginPaint
IsWindow
RedrawWindow
GetClassNameW
GetDesktopWindow
CreateAcceleratorTableW
wsprintfW
LoadStringW
ReleaseCapture
GetIconInfo
SetCapture
DrawAnimatedRects
DestroyIcon
CopyImage
GetKeyboardState
MessageBoxA
DrawEdge
GetCapture
SetCursor
GetMessagePos
GetSubMenu
SetRectEmpty
GetWindowPlacement
RegisterHotKey
UnregisterHotKey
UnhookWindowsHookEx
SetDlgItemTextW
GetDlgItemTextW
EnableWindow
IsCharLowerW
SendMessageA
EnableMenuItem
CheckMenuItem
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
GetCaretPos
SetRect
SetForegroundWindow
SetActiveWindow
GetMenuItemRect
GetMenuItemCount
GetMenuState
GetMenuItemID
CreatePopupMenu
CharUpperW
keybd_event
MapVirtualKeyW
DialogBoxParamW
GetDlgItemInt
UpdateWindow
LoadIconW
LoadAcceleratorsW
EnumWindows
SendMessageTimeoutW
AppendMenuW
DrawFocusRect
InflateRect
IntersectRect
IsRectEmpty
ClientToScreen
MoveWindow
PostMessageW
SetWindowsHookExW
CallNextHookEx
GetWindowDC
GetMenuItemInfoW
OffsetRect
SetPropW
InvalidateRgn
DrawTextW
InvalidateRect
CreateIconIndirect
gdi32
LPtoDP
RestoreDC
LineTo
MoveToEx
CreatePen
SaveDC
DPtoLP
CreatePatternBrush
SetBitmapBits
GetBitmapBits
SetPixel
GetPixel
SetWindowOrgEx
GetBkColor
ExcludeClipRect
SetPixelV
GetTextExtentPoint32W
OffsetWindowOrgEx
GetClipBox
CreateSolidBrush
GetDeviceCaps
CreateDCW
CreateEnhMetaFileW
CloseEnhMetaFile
SelectPalette
RealizePalette
CreateCompatibleBitmap
GetCurrentObject
CreateBitmap
GetStockObject
SetBkMode
SetTextColor
GetDIBits
GetObjectW
CreateDIBSection
CreateCompatibleDC
SelectObject
SetBkColor
ExtTextOutW
CreateFontIndirectW
DeleteObject
BitBlt
DeleteDC
PatBlt
comdlg32
GetOpenFileNameW
advapi32
CryptAcquireContextW
CryptDestroyHash
CryptReleaseContext
CryptHashData
CryptGetHashParam
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyW
GetUserNameW
CryptCreateHash
OpenProcessToken
GetTokenInformation
RegOpenKeyExW
shell32
SHGetFileInfoW
SHAppBarMessage
Shell_NotifyIconW
SHGetDesktopFolder
ord25
ord155
SHGetMalloc
ExtractIconExW
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExW
ole32
RegisterDragDrop
CreateStreamOnHGlobal
CoInitialize
CoCreateInstance
OleInitialize
OleUninitialize
CLSIDFromProgID
CLSIDFromString
StringFromCLSID
OleLockRunning
CoTaskMemAlloc
DoDragDrop
CoTaskMemFree
oleaut32
VariantTimeToSystemTime
OleCreateFontIndirect
SysAllocStringLen
SafeArrayDestroy
VariantInit
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocString
SysStringLen
LoadRegTypeLi
DispCallFunc
VariantClear
SysFreeString
SystemTimeToVariantTime
comctl32
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_GetImageCount
ImageList_Create
ImageList_Add
ImageList_Draw
ord17
ImageList_LoadImageW
InitCommonControlsEx
ImageList_DrawEx
Sections
.text Size: 233KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ