Static task
static1
Behavioral task
behavioral1
Sample
137126a2e955988044abc30c660489a571eb25516b382d8eea0fc208c4145381.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
137126a2e955988044abc30c660489a571eb25516b382d8eea0fc208c4145381.exe
Resource
win10v2004-20230220-en
General
-
Target
137126a2e955988044abc30c660489a571eb25516b382d8eea0fc208c4145381.exe
-
Size
291KB
-
MD5
8c55c944cb6d81d58f2ffee7d0686c6c
-
SHA1
60635f5e2c1bc59945a60e52e1da1711550309bd
-
SHA256
137126a2e955988044abc30c660489a571eb25516b382d8eea0fc208c4145381
-
SHA512
1ab2caee8f1eb743faa3e841abbd0d12e679daeed18b5139ced1aea62ec8b228106df9f409071b9812f3b948a3b7e01c79d19e6f7968069f162c9e6a9b1d8221
-
SSDEEP
6144:C8pJxhKjBkhD5qslNvdA6NZ+cP0MMUcMUDyu5Wp2i/UdSGZRW:1pJxrDNlp1PeuUd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 137126a2e955988044abc30c660489a571eb25516b382d8eea0fc208c4145381.exe
Files
-
137126a2e955988044abc30c660489a571eb25516b382d8eea0fc208c4145381.exe.exe windows x64
31e556ae7fe1ed4edcf727f836365d92
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegSetValueExW
OpenSCManagerW
EnumServicesStatusW
OpenServiceW
CloseServiceHandle
ChangeServiceConfigW
QueryServiceConfigW
RegEnumKeyExW
RegOpenKeyExW
RegCreateKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteValueW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
InitiateShutdownW
kernel32
DeleteFileW
MoveFileExW
FindResourceW
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetSystemInfo
GetPhysicallyInstalledSystemMemory
GlobalMemoryStatusEx
GetCurrentProcess
FindFirstFileW
CopyFileW
FreeLibrary
FormatMessageW
LocalFree
HeapSetInformation
RegisterApplicationRestart
OpenProcess
GetCurrentProcessId
GetCurrentThreadId
GetCommandLineW
CompareStringW
SetFileAttributesW
CreateDirectoryW
CreateSemaphoreW
MultiByteToWideChar
WideCharToMultiByte
lstrcmpiW
lstrlenW
FindClose
RtlCompareMemory
FindNextFileW
GetDateFormatW
QueryDosDeviceW
LocalAlloc
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
InterlockedPushEntrySList
VirtualAlloc
InterlockedPopEntrySList
GetProcessHeap
VirtualFree
HeapFree
HeapAlloc
GetNativeSystemInfo
CloseHandle
CreateThread
GetModuleHandleW
LoadLibraryW
GetProcAddress
ExpandEnvironmentStringsW
GetTimeFormatW
GetLastError
FlushInstructionCache
gdi32
GetTextMetricsW
SelectObject
GetTextExtentPoint32W
user32
SetCursor
LoadCursorW
GetFocus
ShowWindow
MessageBoxW
IsWindowEnabled
GetSystemMetrics
EndDialog
SetFocus
SetWindowTextW
LoadStringW
GetActiveWindow
GetDlgItem
GetDlgItemTextW
GetClientRect
SendMessageW
LoadIconW
CharNextW
FindWindowW
SetForegroundWindow
IsIconic
GetLastActivePopup
IsDlgButtonChecked
CheckDlgButton
SetDlgItemInt
SetDlgItemTextW
GetWindowTextLengthW
GetWindowTextW
SetWindowLongPtrW
GetDC
ReleaseDC
GetKeyState
CallWindowProcW
GetWindowLongPtrW
EnableWindow
mfc42u
ord1584
ord6813
ord4836
ord2559
ord2515
ord6071
ord4191
ord6887
ord337
ord852
ord2328
ord4557
ord5049
ord3761
ord4771
ord4988
ord4371
ord3164
ord4077
ord4083
ord4082
ord3046
ord3166
ord3052
ord3366
ord3231
ord4815
ord3362
ord3243
ord3049
ord5699
ord2140
ord2457
ord5683
ord1736
ord5484
ord3933
ord6814
ord2060
ord2670
ord4789
ord5229
ord4017
ord5702
ord4694
ord6812
ord5586
ord2399
ord5663
ord4752
ord1777
ord4365
ord6437
ord2517
ord5077
ord5406
ord5245
ord4721
ord5687
ord6886
ord1906
ord1126
ord2948
ord1287
ord549
ord999
ord628
ord1042
ord4582
ord626
ord1040
ord3177
ord4647
ord1463
ord4473
ord1781
ord5967
ord4860
ord620
ord4521
ord2783
ord624
ord2629
ord644
ord6418
ord6705
ord2785
ord5937
ord1122
ord2408
ord1358
ord4344
ord1284
ord1259
ord4046
ord3458
ord5227
ord5709
ord5246
ord4722
ord5352
ord5382
ord5114
ord5304
ord5583
ord5585
ord5584
ord2661
ord6641
ord4601
ord6704
ord6021
ord1262
ord4436
ord6707
ord2846
ord5980
ord6050
ord1749
ord1787
ord1264
ord2784
ord6326
ord3180
ord3183
ord4548
ord2845
ord1908
ord559
ord1003
ord4583
ord5082
ord1441
ord3630
ord6199
ord4779
ord2059
ord4787
ord5710
ord1778
ord6440
ord2532
ord1698
ord4598
ord5039
ord659
ord1063
ord1430
ord318
ord834
ord5630
ord2801
ord6708
ord4609
ord1365
ord2752
ord2906
ord6632
ord3916
ord4770
ord4983
ord6053
ord5711
ord5730
ord5065
ord4368
ord5724
ord5722
ord3468
ord2412
ord5615
ord1388
msvcrt
??1type_info@@UEAA@XZ
_unlock
__dllonexit
_lock
_onexit
_amsg_exit
_initterm
_wcmdln
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__wgetmainargs
__CxxFrameHandler3
?terminate@@YAXXZ
_CxxThrowException
??0exception@@QEAA@AEBQEBDH@Z
iswdigit
wcsrchr
_wtoi
memmove
calloc
_vsnwprintf
_wtol
_itow_s
memcpy
memcmp
_snwscanf_s
_wcsupr
wcsnlen
strncmp
wcsncpy_s
__set_app_type
_fmode
_commode
_callnewh
memset
_ultow_s
wcschr
_wcsnicmp
wcstoul
swprintf_s
wcscpy_s
wcscat_s
_wcsicmp
??0exception@@QEAA@XZ
memmove_s
??0exception@@QEAA@AEBQEBD@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
memcpy_s
??0exception@@QEAA@AEBV0@@Z
_wcsicoll
wcstok
wcsstr
_wcslwr
_purecall
free
malloc
__setusermatherr
atl
ord35
ord44
ord20
ord21
ord16
ord23
ord57
ord18
ord17
ord43
shell32
ShellExecuteW
SHEvaluateSystemCommandTemplate
SHGetSpecialFolderPathW
oleaut32
SysAllocString
VariantChangeType
VariantClear
SysFreeString
VariantInit
ole32
CreateStreamOnHGlobal
CoInitializeEx
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ntdll
RtlNtStatusToDosError
RtlInitUnicodeString
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
WinSqmAddToStream
NtResetEvent
NtDeleteFile
NtQueryVolumeInformationFile
LdrGetDllHandle
NtQueryInformationFile
RtlStringFromGUID
NtQuerySystemInformation
RtlFreeHeap
RtlFreeUnicodeString
RtlGUIDFromString
NtClose
RtlAllocateHeap
NtOpenFile
NtDeviceIoControlFile
NtWaitForSingleObject
NtCreateEvent
NtQueryKey
NtEnumerateKey
NtQueryAttributesFile
NtOpenKey
RtlCreateAcl
NtSaveKey
NtUnloadKey
RtlFreeSid
RtlSetDaclSecurityDescriptor
NtDeleteValueKey
NtLoadKey
NtOpenThreadToken
NtCreateKey
NtCreateFile
RtlLengthSecurityDescriptor
RtlAddAccessAllowedAceEx
NtOpenProcessToken
NtSetSecurityObject
NtQueryValueKey
NtSetValueKey
NtAdjustPrivilegesToken
NtDeleteKey
RtlAllocateAndInitializeSid
RtlLengthSid
RtlCreateSecurityDescriptor
RtlSetOwnerSecurityDescriptor
NtAllocateUuids
RtlInitAnsiString
NtOpenSymbolicLinkObject
LdrGetProcedureAddress
NtQuerySymbolicLinkObject
WinSqmIncrementDWORD
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ