Static task
static1
Behavioral task
behavioral1
Sample
782c2796ca43f0307e138d0785375246d57cc63370d163c2de92ce39aaa0f59f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
782c2796ca43f0307e138d0785375246d57cc63370d163c2de92ce39aaa0f59f.exe
Resource
win10v2004-20230220-en
General
-
Target
782c2796ca43f0307e138d0785375246d57cc63370d163c2de92ce39aaa0f59f
-
Size
130KB
-
MD5
62e13631d71227a67f694abffaead580
-
SHA1
c6847fd811f9d4349a453d2b94fc4b916d36f213
-
SHA256
782c2796ca43f0307e138d0785375246d57cc63370d163c2de92ce39aaa0f59f
-
SHA512
c2cc490e3b166bbe28321f8d34d7a6a9dd60b011268675a0b68e19e13ee0b81d6fa5031769e227aecf9b392e9217d55de4e6a0c43aad311c96c7c05cff99ad1b
-
SSDEEP
3072:a6zWs3JHaQBr9ev0a99VnD+Do5PyIAUrk:a2X5Hpr9C0aF1Trk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 782c2796ca43f0307e138d0785375246d57cc63370d163c2de92ce39aaa0f59f
Files
-
782c2796ca43f0307e138d0785375246d57cc63370d163c2de92ce39aaa0f59f.exe windows x86
ffbc7d47f2445337d029b6ca5cf8233c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetTimeToSystemTime
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpAddRequestHeadersA
InternetSetCookieA
InternetErrorDlg
HttpOpenRequestA
InternetReadFile
InternetCrackUrlA
InternetConnectA
HttpQueryInfoA
InternetTimeFromSystemTime
kernel32
GetProcessHeap
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
SetEndOfFile
SystemTimeToFileTime
CompareFileTime
WriteFile
Sleep
FileTimeToSystemTime
lstrcatA
MultiByteToWideChar
RaiseException
CreateDirectoryA
GetLastError
GetLocalTime
GetFileTime
OutputDebugStringA
CloseHandle
DeleteFileA
lstrcpyA
GetNativeSystemInfo
GetWindowsDirectoryA
WideCharToMultiByte
FindFirstFileA
GetTempFileNameA
FindClose
GetVersionExA
GetFileAttributesA
GetModuleFileNameA
GetTickCount
GetCurrentThreadId
WaitForSingleObject
OpenMutexA
CreateMutexA
LoadLibraryA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
GetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
ExitProcess
InterlockedDecrement
SetLastError
GetTempPathA
TlsGetValue
GetProcAddress
GetModuleHandleW
ReadFile
GetConsoleMode
GetConsoleCP
HeapSize
InterlockedIncrement
TlsFree
TlsSetValue
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
ResumeThread
CreateThread
GetCommandLineA
GetStartupInfoA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
TlsAlloc
user32
MessageBoxA
PostMessageA
SetTimer
GetWindowRect
SetActiveWindow
IsIconic
KillTimer
SetForegroundWindow
AttachThreadInput
LoadIconA
SetFocus
wsprintfW
GetMonitorInfoA
GetForegroundWindow
BringWindowToTop
GetWindowLongA
MonitorFromWindow
GetDlgItem
EndDialog
SetWindowPos
ShowWindow
IsWindowVisible
DialogBoxParamA
SetWindowTextW
GetWindowThreadProcessId
SendMessageA
FindWindowA
GetDesktopWindow
SetWindowTextA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
SHGetSpecialFolderPathA
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.ropf Size: 512B - Virtual size: 15B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ