Static task
static1
Behavioral task
behavioral1
Sample
80f2a16c9a686ae783937f75812d8494b716a4448a51ba5f2ccd14b780b3cd15.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
80f2a16c9a686ae783937f75812d8494b716a4448a51ba5f2ccd14b780b3cd15.exe
Resource
win10v2004-20230220-en
General
-
Target
80f2a16c9a686ae783937f75812d8494b716a4448a51ba5f2ccd14b780b3cd15
-
Size
428KB
-
MD5
2e271597ae6705360ea988c006679373
-
SHA1
87c0600f285c90599f77079da16584352ca7ed7f
-
SHA256
80f2a16c9a686ae783937f75812d8494b716a4448a51ba5f2ccd14b780b3cd15
-
SHA512
0b3e5d900f893b5d896bcf10df18f240c0d3ede2c2b403ae296579da46d78632b357e487f60dd47f2da42e11d23184952356a3a871a66bb517ee9295dd74b242
-
SSDEEP
6144:Z4f8jsf9yLeUHNip/Dz03UHXO7TH80XG14gfCV+:Z4f8jswHNk/03we7TH92K+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 80f2a16c9a686ae783937f75812d8494b716a4448a51ba5f2ccd14b780b3cd15
Files
-
80f2a16c9a686ae783937f75812d8494b716a4448a51ba5f2ccd14b780b3cd15.exe windows x86
40a89e32269fc99615317a9ec90aafbf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetCurrentDirectoryW
GlobalGetAtomNameW
SetErrorMode
DuplicateHandle
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
MoveFileW
FindClose
GetVolumeInformationW
GetFullPathNameW
GetStringTypeExW
GetThreadLocale
GetShortPathNameW
GetFileAttributesW
GetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetStartupInfoW
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
HeapAlloc
HeapFree
CreateThread
ExitThread
HeapReAlloc
LeaveCriticalSection
GetTimeZoneInformation
GetSystemTime
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetEnvironmentStrings
GetCommandLineA
SetHandleCount
GetStdHandle
GetFileType
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
LCMapStringA
LCMapStringW
FatalAppExitA
SetUnhandledExceptionFilter
IsBadCodePtr
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
GetStringTypeW
SetConsoleCtrlHandler
SetStdHandle
GetLocaleInfoW
CompareStringA
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
FindResourceA
GlobalAddAtomA
GetProfileStringA
InitializeCriticalSection
LocalAlloc
SizeofResource
GetLastError
GlobalFlags
lstrcmpiW
SuspendThread
SetThreadPriority
ResumeThread
lstrcmpW
lstrcmpA
lstrcmpiA
GetCurrentThread
FormatMessageW
LocalFree
lstrcpynW
MulDiv
SetLastError
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
LoadLibraryA
lstrlenA
MultiByteToWideChar
GetVersion
lstrcatW
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
lstrcpyW
GetProcAddress
GlobalFree
LockResource
FindResourceW
LoadResource
GetLocalTime
FindNextFileA
GetStartupInfoA
CreatePipe
GetModuleHandleW
GetEnvironmentVariableW
VirtualProtect
GetProcessTimes
FindFirstFileA
ExitProcess
GetCommandLineW
GetTickCount
GetSystemDirectoryW
MoveFileExW
GetTempPathW
CreateDirectoryW
CopyFileW
GetCurrentProcess
FindFirstFileW
FindNextFileW
ReadFile
CreateToolhelp32Snapshot
GlobalUnlock
Process32FirstW
Process32NextW
OpenProcess
VirtualAlloc
ReadProcessMemory
TerminateProcess
VirtualFree
GetModuleFileNameW
SetFileAttributesW
DeleteFileW
OpenMutexW
OpenEventW
CreateMutexW
CreateEventW
ReleaseMutex
WaitForSingleObject
IsBadReadPtr
IsBadWritePtr
SetEvent
GetCurrentThreadId
UnmapViewOfFile
CloseHandle
FlushViewOfFile
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
CreateFileW
DeviceIoControl
GetFileSize
WideCharToMultiByte
lstrlenW
WinExec
GetWindowsDirectoryW
LoadLibraryW
FreeLibrary
Sleep
GlobalAlloc
GlobalSize
GlobalLock
HeapSize
user32
UpdateWindow
CheckDlgButton
CheckRadioButton
GetDlgItemInt
GetDlgItemTextW
SetDlgItemInt
SetDlgItemTextW
IsDlgButtonChecked
ScrollWindowEx
IsDialogMessageW
SetWindowTextW
MoveWindow
ShowWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuW
GetMenuState
LoadBitmapW
GetMenuCheckMarkDimensions
wvsprintfW
WindowFromPoint
GetCursorPos
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutW
DrawTextW
GrayStringW
LoadStringW
DestroyMenu
PostQuitMessage
ShowOwnedPopups
ValidateRect
TranslateMessage
GetClassNameW
GetDesktopWindow
GetDialogBaseUnits
GetSysColorBrush
SetCapture
ReleaseCapture
WaitMessage
GetWindowThreadProcessId
InsertMenuW
DeleteMenu
GetMenuStringW
SetRectEmpty
LoadAcceleratorsW
TranslateAcceleratorW
SetMenu
ReuseDDElParam
UnpackDDElParam
BringWindowToTop
CharUpperW
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
IsWindowVisible
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
MessageBoxW
IsChild
GetCapture
WinHelpW
GetClassInfoW
RegisterClassW
GetMenu
GetMenuItemCount
GetMenuItemID
SendDlgItemMessageW
AdjustWindowRectEx
GetWindowTextLengthW
GetDlgCtrlID
GetKeyState
CreateWindowExW
SetWindowsHookExW
CallNextHookEx
SetPropW
UnhookWindowsHookEx
GetPropW
CallWindowProcW
RemovePropW
DefWindowProcW
GetMessageTime
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoW
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
LoadIconW
IsIconic
GetSystemMenu
AppendMenuW
DrawIcon
GetWindowTextW
IsDialogMessageA
CreateDialogParamW
GetWindowPlacement
RegisterClassA
ToUnicodeEx
GetWindowLongA
GetInputState
PostThreadMessageW
GetMessageW
FindWindowW
PostMessageW
wsprintfW
LoadMenuW
GetSubMenu
DrawFocusRect
GetSystemMetrics
GetParent
KillTimer
EnableWindow
CloseClipboard
GetClipboardData
OpenClipboard
UnregisterClassW
GetWindowTextLengthA
SetTimer
RedrawWindow
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
GetClientRect
GetWindowRect
SendMessageW
InflateRect
PtInRect
LoadCursorW
CopyIcon
IsWindow
GetSysColor
SetCursor
GetMessagePos
MessageBeep
SendDlgItemMessageA
MapWindowPoints
PeekMessageW
DispatchMessageW
GetFocus
TrackPopupMenu
SetFocus
SetWindowLongW
DestroyCursor
EqualRect
SetWindowPlacement
DeferWindowPos
RegisterWindowMessageW
EmptyClipboard
SetClipboardData
GetPropA
SetPropA
SetWindowLongA
GetClassNameA
IsWindowUnicode
SendMessageA
SetWindowsHookExA
RemovePropA
CallWindowProcA
CharNextA
DefWindowProcA
DefDlgProcA
GetClassInfoA
DrawTextA
GetWindowTextA
ExcludeUpdateRgn
ShowCaret
HideCaret
GetWindow
gdi32
SetBkMode
SetPolyFillMode
SetROP2
SetStretchBltMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
IntersectClipRect
OffsetClipRgn
MoveToEx
LineTo
SetTextAlign
SetTextJustification
SetTextCharacterExtra
SetMapperFlags
GetCurrentPositionEx
ArcTo
SetArcDirection
PolyDraw
PolylineTo
SetColorAdjustment
SelectPalette
DeleteObject
GetClipRgn
CreateRectRgn
SelectClipPath
ExtSelectClipRgn
PlayMetaFileRecord
GetObjectType
EnumMetaFile
PlayMetaFile
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
CreatePen
ExtCreatePen
CreateHatchBrush
CreatePatternBrush
CreateDIBPatternBrushPt
PtVisible
RectVisible
TextOutW
Escape
GetMapMode
PatBlt
SetRectRgn
CombineRgn
CreateRectRgnIndirect
DPtoLP
SelectObject
RestoreDC
SaveDC
StartDocW
DeleteDC
CreateBitmap
SetBkColor
GetClipBox
GetDCOrgEx
ExcludeClipRect
SetTextColor
ExtTextOutW
GetCharWidthW
GetTextMetricsW
GetTextExtentPoint32W
GetObjectW
CreateFontIndirectW
CreateSolidBrush
PolyBezierTo
CreateDIBitmap
ExtTextOutA
GetTextExtentPointA
BitBlt
CreateCompatibleDC
GetStockObject
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
OpenProcessToken
RegOpenKeyW
RegDeleteKeyW
RegQueryValueExW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegDeleteValueW
RegCloseKey
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueW
shell32
DragQueryFileW
DragFinish
DragAcceptFiles
SHGetSpecialFolderPathW
ShellExecuteW
SHGetFileInfoW
comctl32
ord17
psapi
GetModuleFileNameExW
EnumProcesses
Sections
.text Size: 304KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ