Static task
static1
Behavioral task
behavioral1
Sample
88751ffcca080a4efa7ed7299eea12812532dec819ec678549f037727fd5fb09.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
88751ffcca080a4efa7ed7299eea12812532dec819ec678549f037727fd5fb09.exe
Resource
win10v2004-20230220-en
General
-
Target
88751ffcca080a4efa7ed7299eea12812532dec819ec678549f037727fd5fb09
-
Size
1.9MB
-
MD5
6508ac455df8eaf33951a9d3f9ff64e3
-
SHA1
d7e3873802492fe40e5de179181711ad8074fd83
-
SHA256
88751ffcca080a4efa7ed7299eea12812532dec819ec678549f037727fd5fb09
-
SHA512
28e1aa71bf167c54a8d2c9fce53fef003822970eb69b177c2013b58817a9dabd27258e705fdf33dca8c004ab510b71a6ee5f0e426ce8511b1c35e0a46ebeef9c
-
SSDEEP
12288:hjW8t5gZ/W/dbxVnOKEZw7JwcZxWK3T4cqZ9RKJJUbPTF6gGX9Yqws3fouyLO:hjD5SQDVnOKD7JwcWyTQ9RDxaYPsPBy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88751ffcca080a4efa7ed7299eea12812532dec819ec678549f037727fd5fb09 -
NSIS installer 1 IoCs
resource yara_rule sample nsis_installer_2
Files
-
88751ffcca080a4efa7ed7299eea12812532dec819ec678549f037727fd5fb09.exe windows x86
2e688e8d3f4773c94e9ccfcb24606703
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
UrlUnescapeA
crypt32
CertOpenStore
CertDuplicateCertificateContext
CertCreateCertificateContext
CertNameToStrA
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertFindExtension
CryptDecodeObject
CertFreeCertificateContext
CertEnumCertificatesInStore
wininet
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetQueryDataAvailable
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenUrlA
HttpQueryInfoA
InternetGetConnectedState
kernel32
GetFileAttributesA
GetFileSizeEx
GetFileTime
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
SetErrorMode
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualAlloc
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetStartupInfoA
RtlUnwind
HeapReAlloc
Sleep
ExitProcess
SetStdHandle
GetFileType
HeapSize
HeapCreate
VirtualFree
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetStdHandle
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetTickCount
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetThreadLocale
GetModuleFileNameW
LocalAlloc
GetCurrentProcessId
SetLastError
MulDiv
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
InitializeCriticalSection
CreateMutexA
DeleteCriticalSection
GetModuleFileNameA
LoadLibraryExA
RaiseException
lstrlenW
IsDBCSLeadByte
lstrcmpiA
lstrlenA
LoadLibraryW
GetTempPathA
GetVersionExA
CreateToolhelp32Snapshot
GetModuleHandleA
GetSystemInfo
Process32Next
GetSystemDirectoryA
TerminateProcess
OpenProcess
WriteFile
GetWindowsDirectoryA
GetProcessHeap
Process32First
HeapFree
GetCurrentProcess
HeapAlloc
CreateFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
CloseHandle
OpenMutexA
lstrcpyA
lstrcmpA
lstrcatA
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
MultiByteToWideChar
LocalFree
FormatMessageA
VirtualQuery
user32
PostThreadMessageA
UnregisterClassA
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
MessageBeep
GetNextDlgGroupItem
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetWindowContextHelpId
MapDialogRect
RegisterClipboardFormatA
CharUpperA
PostQuitMessage
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
SetRect
IsRectEmpty
CopyAcceleratorTableA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
SetActiveWindow
DispatchMessageA
GetTopWindow
DestroyWindow
GetMessagePos
PeekMessageA
MapWindowPoints
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
IsWindow
GetDlgItem
OffsetRect
PtInRect
CopyRect
GetDlgCtrlID
GetWindow
UnhookWindowsHookEx
GetDesktopWindow
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowPos
DrawIcon
IsIconic
GetClientRect
SendMessageA
AppendMenuA
GetSystemMenu
LoadIconA
GetAsyncKeyState
GetKeyState
MessageBoxA
CharNextW
PostMessageA
RegisterWindowMessageA
CharNextA
EnableWindow
wsprintfA
GetSystemMetrics
GetMessageTime
gdi32
GetMapMode
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
ScaleWindowExtEx
GetTextColor
GetBkColor
GetObjectA
GetStockObject
DeleteDC
ScaleViewportExtEx
ExtSelectClipRgn
Escape
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetRgnBox
CreateRectRgnIndirect
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
SetWindowExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegDeleteKeyA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupAccountSidA
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegCloseKey
comctl32
InitCommonControlsEx
oledlg
ord8
ole32
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoRegisterClassObject
CoRevokeClassObject
StringFromGUID2
CoCreateInstance
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CLSIDFromProgID
CLSIDFromString
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocStringLen
VariantInit
VariantClear
SysAllocStringByteLen
SysStringByteLen
VariantCopy
VarUI4FromStr
SysFreeString
SafeArrayDestroy
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantChangeType
OleCreateFontIndirect
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
RegisterTypeLi
Sections
.text Size: 281KB - Virtual size: 281KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ