Static task
static1
Behavioral task
behavioral1
Sample
537816fcf17ac4550fa76f5703eaf5a0c1cfb661f550d9771cce50f4ef98f9ef.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
537816fcf17ac4550fa76f5703eaf5a0c1cfb661f550d9771cce50f4ef98f9ef.exe
Resource
win10v2004-20230221-en
General
-
Target
537816fcf17ac4550fa76f5703eaf5a0c1cfb661f550d9771cce50f4ef98f9ef
-
Size
29.2MB
-
MD5
34fdfc95252c445e79bd24365f9a3e7e
-
SHA1
d7e8879ea7036aff3b36c42b96d6e1863b955865
-
SHA256
537816fcf17ac4550fa76f5703eaf5a0c1cfb661f550d9771cce50f4ef98f9ef
-
SHA512
564351512a52138dfba9d5aec7b8d2da64a3c244c0b9053a1f592388cfa2d0cdf426bfb1f4c73cc8492805c45f8811bfbf0b36d8c0c251642d78bc1bbf821b71
-
SSDEEP
786432:oeBTLFCg7Avn2wFYjuhHbpSNil5yGj/UIWE:oeBwg7gn2wguVNqilDjL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 537816fcf17ac4550fa76f5703eaf5a0c1cfb661f550d9771cce50f4ef98f9ef
Files
-
537816fcf17ac4550fa76f5703eaf5a0c1cfb661f550d9771cce50f4ef98f9ef.exe windows x86
0b08302f2fa23295b1a4f16f7311cd2d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmDisableIME
iphlpapi
GetAdaptersInfo
kernel32
WritePrivateProfileStringW
FlushFileBuffers
LockFile
UnlockFile
DuplicateHandle
GetVolumeInformationW
GetFullPathNameW
GetTickCount
SetErrorMode
GetFileSizeEx
GetStartupInfoW
ExitProcess
HeapReAlloc
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetTimeZoneInformation
GetLocaleInfoA
SetStdHandle
WriteConsoleA
WriteConsoleW
LCMapStringA
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
GetFileType
lstrlenA
Sleep
CreateThread
FindResourceW
LoadResource
SizeofResource
GetFileAttributesW
LockResource
CreateFileW
CreateMutexW
SetUnhandledExceptionFilter
GetCurrentProcess
CreateDirectoryW
WaitForSingleObject
GetModuleHandleW
CopyFileW
GetVersionExW
GetTempPathW
GetLastError
GetProcAddress
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
GetFileSize
MapViewOfFile
UnmapViewOfFile
InterlockedDecrement
FlushViewOfFile
CreateFileMappingW
DeviceIoControl
SetFilePointer
FreeLibrary
HeapAlloc
HeapFree
GetProcessHeap
LoadLibraryW
ReadFile
GetModuleFileNameW
DeleteFileW
GetEnvironmentVariableW
GetTempFileNameW
SetPriorityClass
FindFirstFileW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GetModuleHandleA
GetThreadLocale
InterlockedIncrement
FormatMessageW
LocalFree
MulDiv
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
SetLastError
GlobalLock
GlobalUnlock
FreeResource
GetFileTime
CreateFileA
WriteFile
FileTimeToLocalFileTime
SetFileAttributesW
ResumeThread
GetSystemTime
DebugBreak
GetWindowsDirectoryW
GetShortPathNameW
FindNextFileW
RemoveDirectoryW
SetCurrentDirectoryW
FindClose
GlobalFree
GetCurrentDirectoryW
lstrlenW
MultiByteToWideChar
FileTimeToSystemTime
WideCharToMultiByte
GetSystemDirectoryW
GlobalAlloc
SetEndOfFile
SetFilePointerEx
MoveFileExW
CreateProcessW
GetConsoleOutputCP
user32
MessageBeep
GetNextDlgGroupItem
CharUpperW
ReleaseCapture
SetCapture
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableW
UnregisterClassW
DestroyMenu
GetSysColorBrush
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowThreadProcessId
CharNextW
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
GetDlgItemTextW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
UpdateWindow
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
EnableWindow
SendMessageW
IsWindowVisible
KillTimer
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
PtInRect
GetDlgCtrlID
DefWindowProcW
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
ReleaseDC
GetDC
CopyRect
GetSubMenu
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
RegisterClipboardFormatW
PostThreadMessageW
IsWindow
IsWindowEnabled
SetPropW
SetTimer
LoadIconW
InvalidateRect
DrawIconEx
LoadImageW
FillRect
MessageBoxW
SetDlgItemTextA
GetDlgItemTextA
GetSystemMetrics
GetClientRect
DrawIcon
LoadCursorW
IsIconic
SetCursor
CallWindowProcW
SetWindowPos
EndDialog
SetWindowLongW
GetDlgItem
SystemParametersInfoW
GetWindowTextW
GetParent
GetWindowRect
GetKeyboardLayoutList
LoadKeyboardLayoutW
PostMessageW
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuW
GetFocus
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
SetFocus
GetWindowLongW
GetWindow
GetNextDlgTabItem
GetWindowTextLengthW
CheckRadioButton
gdi32
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
ExtTextOutW
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ExtSelectClipRgn
DeleteDC
GetMapMode
GetRgnBox
SetMapMode
RestoreDC
SaveDC
GetTextColor
GetBkColor
GetStockObject
GetDeviceCaps
GetObjectW
SetBkColor
GetClipBox
CreateRectRgnIndirect
CreateBitmap
AddFontResourceW
SetTextColor
SetBkMode
SelectObject
CreateFontW
TextOutW
ScaleWindowExtEx
CreateSolidBrush
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegOpenKeyExW
RegQueryValueW
GetSecurityDescriptorDacl
GetLengthSid
AddAce
InitializeAcl
SetFileSecurityW
GetAce
SetSecurityDescriptorDacl
LookupAccountNameW
GetFileSecurityW
InitializeSecurityDescriptor
EqualSid
GetSecurityDescriptorControl
GetAclInformation
AddAccessAllowedAceEx
RegCreateKeyW
SetSecurityDescriptorControl
RegSetValueExW
RegEnumKeyExW
RegDeleteKeyW
RegOpenKeyW
RegCreateKeyExW
RegEnumKeyW
RegCloseKey
RegQueryValueExW
shell32
ShellExecuteW
SHGetFolderPathW
SHChangeNotify
SHGetSpecialFolderPathW
ShellExecuteExW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
oledlg
OleUIBusyW
ole32
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
IIDFromString
CoTaskMemFree
StringFromGUID2
StringFromCLSID
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoInitialize
CoUninitialize
StgOpenStorageOnILockBytes
CoGetClassObject
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocStringLen
VariantChangeType
SysStringLen
OleCreateFontIndirect
VariantCopy
SysFreeString
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantInit
VariantClear
SysAllocString
dbghelp
MiniDumpWriteDump
wininet
InternetCloseHandle
HttpQueryInfoW
InternetOpenUrlW
InternetOpenW
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 327KB - Virtual size: 326KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ