Static task
static1
Behavioral task
behavioral1
Sample
b6a14fccd40da345ca4c82a4f1ea76a7d5263879d6eb4105bd4743f5c3a9958e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b6a14fccd40da345ca4c82a4f1ea76a7d5263879d6eb4105bd4743f5c3a9958e.exe
Resource
win10v2004-20230220-en
General
-
Target
b6a14fccd40da345ca4c82a4f1ea76a7d5263879d6eb4105bd4743f5c3a9958e
-
Size
3.8MB
-
MD5
a718c0969283a4e369b6e73987c44566
-
SHA1
e7f60a2d0b3d62bf0742ce1f8aa297e106a892ea
-
SHA256
b6a14fccd40da345ca4c82a4f1ea76a7d5263879d6eb4105bd4743f5c3a9958e
-
SHA512
aa0c73469c90edba1463dddc4cc77a92e9f0046e4bc0e8d7d5355b0a45a1a1f01af52cde461ce3fd1d2b4808b952a130a360f0315144f0ed62dfb76c912eaa01
-
SSDEEP
98304:P+yho6uRgqiO8c52lQtOQej8Sf+0D51GdQ8xxZI:P1Dqr58QtOlj8SHGdbxZI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6a14fccd40da345ca4c82a4f1ea76a7d5263879d6eb4105bd4743f5c3a9958e
Files
-
b6a14fccd40da345ca4c82a4f1ea76a7d5263879d6eb4105bd4743f5c3a9958e.exe windows x86
e22889d446306103ad0e21b8726c24a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceExW
InterlockedDecrement
CreateEventA
GetCommandLineW
InterlockedIncrement
CreateThread
lstrcmpiW
OutputDebugStringW
GetStdHandle
GetFileInformationByHandle
GetSystemInfo
GetProcessAffinityMask
GlobalMemoryStatus
FileTimeToSystemTime
FileTimeToLocalFileTime
SetFilePointer
SetEndOfFile
ReadFile
WriteFile
GetFileSize
FindNextFileW
FindFirstFileW
GetModuleHandleA
FindClose
MoveFileExW
MoveFileW
DeleteFileW
GetFileAttributesW
SetFileAttributesW
CreateFileW
RemoveDirectoryW
CreateDirectoryW
GetCurrentDirectoryW
GetWindowsDirectoryW
GetTempPathW
SetFileTime
SetLastError
GetCurrentThreadId
GetCurrentProcessId
FormatMessageW
LocalFree
GetModuleFileNameW
LoadLibraryW
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
CreateEventW
CloseHandle
WaitForSingleObject
ReleaseSemaphore
ResetEvent
SetEvent
InitializeCriticalSection
GetSystemDirectoryW
LoadLibraryExW
lstrcatW
GetVersionExW
VirtualFree
VirtualAlloc
lstrlenW
GetModuleHandleW
GetProcAddress
FindResourceW
SizeofResource
LoadResource
LockResource
SetPriorityClass
Sleep
WaitForMultipleObjects
GetCurrentProcess
CompareFileTime
GetTickCount
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
GetLastError
RaiseException
SetThreadPriority
DecodePointer
WriteConsoleW
SetStdHandle
GetStringTypeW
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
GetACP
VerSetConditionMask
VerifyVersionInfoW
FreeResource
ExitProcess
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetFileType
DuplicateHandle
SystemTimeToFileTime
DosDateTimeToFileTime
GetLocalTime
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
GetExitCodeProcess
CreateProcessW
CopyFileW
RtlUnwind
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetTimeZoneInformation
ReadConsoleW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
CreateSemaphoreA
user32
MapWindowPoints
IsRectEmpty
PtInRect
UpdateWindow
IntersectRect
IsIconic
SetWindowRgn
CharPrevW
DrawTextW
FillRect
SetRect
GetDesktopWindow
MonitorFromPoint
GetWindowRgn
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
CreateCaret
HideCaret
ShowCaret
SetCaretPos
GetCaretPos
ClientToScreen
GetSysColor
CreateAcceleratorTableW
InvalidateRgn
DestroyIcon
GetIconInfo
RegisterClassExW
IsWindowVisible
GetCursorPos
BringWindowToTop
GetUpdateRect
SetWindowPos
DestroyWindow
IsWindow
RegisterClassW
DefWindowProcW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
PostMessageW
SendMessageW
ShowWindow
MoveWindow
GetDlgItem
EndPaint
BeginPaint
ReleaseDC
GetDC
SetCapture
UpdateLayeredWindow
OffsetRect
UnionRect
InflateRect
GetMonitorInfoW
MonitorFromWindow
LoadImageW
GetWindow
GetClientRect
CharNextW
PostQuitMessage
ReleaseCapture
IsZoomed
GetWindowTextLengthW
GetWindowTextW
LoadStringW
CreateWindowExW
CallWindowProcW
SystemParametersInfoW
MapDialogRect
SetWindowLongW
GetWindowLongW
CharUpperW
wsprintfW
LoadIconW
LoadCursorW
GetParent
SetCursor
MessageBoxW
GetPropW
SetPropW
SetForegroundWindow
GetSystemMetrics
MsgWaitForMultipleObjects
EndDialog
GetClassInfoExW
SetDlgItemTextW
SetFocus
KillTimer
SetTimer
ScreenToClient
GetWindowRect
SetWindowTextW
InvalidateRect
EnableWindow
GetKeyState
GetFocus
gdi32
SetStretchBltMode
StretchBlt
SetBkMode
SetBkColor
ExtSelectClipRgn
DeleteObject
CreateICW
SetTextColor
MoveToEx
TextOutW
GetDeviceCaps
CreateRectRgn
PtInRegion
SelectClipRgn
LineTo
GetTextExtentPoint32W
GetClipBox
GetCharABCWidthsW
CreateSolidBrush
CreateRectRgnIndirect
CreatePenIndirect
CombineRgn
GetObjectA
CreateRoundRectRgn
GetDIBits
CreateDCW
SetWindowOrgEx
GetObjectW
CreateDIBSection
GetTextMetricsW
SelectObject
SaveDC
RestoreDC
Rectangle
GetStockObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateCompatibleDC
BitBlt
CreateCompatibleBitmap
advapi32
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegQueryInfoKeyW
RegCloseKey
RegCreateKeyExW
shell32
ShellExecuteW
SHGetFileInfoW
SHGetPathFromIDListW
SHBrowseForFolderW
ord75
SHGetSpecialFolderPathW
ole32
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoCreateInstance
RegisterDragDrop
RevokeDragDrop
CoTaskMemRealloc
CoTaskMemFree
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
OleLockRunning
oleaut32
SysStringLen
SysAllocString
SysAllocStringLen
VariantClear
SysFreeString
VarUI4FromStr
VariantInit
shlwapi
PathFileExistsW
ord219
gdiplus
GdipDrawArcI
GdipCreateBitmapFromHBITMAP
GdipCreateHBITMAPFromBitmap
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipAlloc
GdipFree
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCreateFromHDC
GdipDeleteGraphics
GdipDrawImageRectI
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipSetTextRenderingHint
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipDrawString
GdipMeasureString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetStringFormatTrimming
GdipCreatePath
GdipDeletePath
GdipAddPathLineI
GdipAddPathArcI
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipGetImageGraphicsContext
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
GdipSetCompositingMode
GdipSetCompositingQuality
GdipSetSmoothingMode
GdipSetPixelOffsetMode
GdipSetInterpolationMode
GdipDrawRectangleI
GdipDrawPath
GdipFillRectangleI
GdipDrawImageRectRect
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipGetGenericFontFamilySansSerif
GdipCreateFont
GdipStringFormatGetGenericTypographic
GdipCloneStringFormat
GdiplusStartup
GdiplusShutdown
GdipCreateLineBrushI
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
comctl32
_TrackMouseEvent
ord17
imm32
ImmGetContext
ImmSetCompositionWindow
ImmReleaseContext
Sections
.text Size: 775KB - Virtual size: 774KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ