Static task
static1
Behavioral task
behavioral1
Sample
967f40ea39e58e4517a249b19b1984bca7010cf88f0a5e1fa6cb87c644dd0e08.exe
Resource
win7-20240729-en
General
-
Target
967f40ea39e58e4517a249b19b1984bca7010cf88f0a5e1fa6cb87c644dd0e08
-
Size
428KB
-
MD5
3198d25bfb20fa5b6837122529e4cac6
-
SHA1
bb6f7c151dcf8fa53029a82aa1ba344a5e62b448
-
SHA256
967f40ea39e58e4517a249b19b1984bca7010cf88f0a5e1fa6cb87c644dd0e08
-
SHA512
658a44cc12e8e8f0d950546cb65ac44e714f69f8a1e2efd2938e2f68d09ccdba59922d80131481473ace1786a4e52baea90fbf45848d640cc4de57ebcaf71a1f
-
SSDEEP
12288:j61KBnflNHOvmzIeCHA3/qJd60gmoP1jjv08/adpTK:j6wXCg3/qJd60gmoP1jjv08/ipTK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 967f40ea39e58e4517a249b19b1984bca7010cf88f0a5e1fa6cb87c644dd0e08
Files
-
967f40ea39e58e4517a249b19b1984bca7010cf88f0a5e1fa6cb87c644dd0e08.exe windows:4 windows x86 arch:x86
ee19241cce6d01dc1a110b9c36cdb024
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
GetACP
GetStringTypeA
GetStringTypeW
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
HeapSize
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SizeofResource
GetStartupInfoA
GetProcessHeap
GetCommandLineA
VirtualAlloc
HeapReAlloc
HeapFree
HeapAlloc
RaiseException
RtlUnwind
SetErrorMode
GetTickCount
LocalFileTimeToFileTime
FileTimeToLocalFileTime
CreateFileA
GetShortPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
SystemTimeToFileTime
FileTimeToSystemTime
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
CloseHandle
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GetCurrentProcessId
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
GetThreadLocale
InterlockedIncrement
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
SetLastError
lstrcmpW
GetModuleHandleA
GetVersionExA
GetStringTypeExA
lstrlenA
CompareStringW
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
lstrcmpiA
LoadLibraryExW
ExitProcess
LoadLibraryExA
GetProcAddress
GetCurrentProcess
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
GetSystemTimeAsFileTime
user32
UnregisterClassA
RegisterClipboardFormatA
CopyAcceleratorTableA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuItemInfoA
InflateRect
DestroyCursor
SetCapture
SetWindowRgn
DrawIcon
FillRect
FindWindowA
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
ShowOwnedPopups
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
UnionRect
GetDC
ReleaseDC
IsZoomed
GetCursorPos
WindowFromPoint
KillTimer
SetTimer
ClientToScreen
SetRect
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
GetWindowThreadProcessId
GetActiveWindow
ReleaseCapture
LoadAcceleratorsA
InvalidateRect
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
GetDesktopWindow
TranslateAcceleratorA
GetMenuStringA
AppendMenuA
InsertMenuA
RemoveMenu
IsWindowEnabled
ShowWindow
SetWindowTextA
GetTabbedTextExtentA
SetDlgItemTextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
TrackPopupMenu
GetKeyState
EnableWindow
GetSystemMenu
UpdateWindow
SendMessageA
IsIconic
GetParent
IsWindow
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
GetClientRect
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
PostThreadMessageA
CreateMenu
DestroyIcon
LockWindowUpdate
GetDCEx
SetParent
IsDialogMessageA
DeleteMenu
GetWindowTextA
GetForegroundWindow
GetSystemMetrics
SetCursor
LoadCursorA
CharUpperA
GetWindow
GetWindowRect
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
SetWindowPos
SetWindowLongA
GetWindowLongA
CallWindowProcA
DefWindowProcA
GetDlgCtrlID
PtInRect
SetScrollInfo
GetScrollInfo
CopyRect
DeferWindowPos
EqualRect
ScreenToClient
AdjustWindowRectEx
GetSysColor
RegisterClassA
GetClassInfoA
IsRectEmpty
gdi32
SelectClipRgn
CreateRectRgn
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
CreatePatternBrush
CreateSolidBrush
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetNearestColor
GetBkMode
GetPolyFillMode
GetROP2
GetStretchBltMode
GetTextAlign
GetTextFaceA
GetWindowOrgEx
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
SaveDC
ExtTextOutA
BitBlt
CreateFontIndirectA
PatBlt
Rectangle
GetViewportOrgEx
CreatePen
Ellipse
LPtoDP
CreateEllipticRgn
EndDoc
AbortDoc
SetAbortProc
EndPage
StartPage
StartDocA
DPtoLP
StretchDIBits
DeleteDC
CreateFontA
GetCharWidthA
DeleteObject
GetTextExtentPoint32A
GetTextMetricsA
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreateDCA
GetTextColor
GetBkColor
GetDeviceCaps
GetStockObject
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
RestoreDC
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
GetJobA
ClosePrinter
advapi32
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegSetValueA
RegCloseKey
CryptAcquireContextA
RegCreateKeyA
shell32
DragQueryFileA
ExtractIconA
SHGetFileInfoA
DragFinish
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
IsAccelerator
OleTranslateAccelerator
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysFreeString
SysStringLen
SysAllocString
Sections
.text Size: 280KB - Virtual size: 277KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ