Static task
static1
Behavioral task
behavioral1
Sample
10f1e7b68c37b0d74ec4fb6a71c8ccd7c11192538e33a5df21884d8c68d74c1c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
10f1e7b68c37b0d74ec4fb6a71c8ccd7c11192538e33a5df21884d8c68d74c1c.exe
Resource
win10v2004-20230220-en
General
-
Target
10f1e7b68c37b0d74ec4fb6a71c8ccd7c11192538e33a5df21884d8c68d74c1c
-
Size
2.7MB
-
MD5
d0595349daa2f4be828ebe0bdc3b54ac
-
SHA1
fc23c186bd42040ded5654ac7650ea172645b83e
-
SHA256
10f1e7b68c37b0d74ec4fb6a71c8ccd7c11192538e33a5df21884d8c68d74c1c
-
SHA512
f40ad554437b12a41394b2ec1b3d77d7213c81895d2f6e49bc33189c86373288db469cf614f2808760f0c09dd9eaad9b2acd1d29ef8cfc8f04684f927e585115
-
SSDEEP
49152:h41ghvpBCSGOfRO4dKGGJO7KaT+xqAM+jdh/CYQ61rSBWH+gspbikp7JgS6YrLUx:h4gvpBCSGO5TLGJYCtM+H/CYyZ/pxJgL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10f1e7b68c37b0d74ec4fb6a71c8ccd7c11192538e33a5df21884d8c68d74c1c
Files
-
10f1e7b68c37b0d74ec4fb6a71c8ccd7c11192538e33a5df21884d8c68d74c1c.exe windows x86
2eb92d19a953054c508c924a47e841ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetCurrentDirectoryA
GetACP
ExitProcess
GetFileSize
SetFilePointer
SetFileTime
DuplicateHandle
SystemTimeToFileTime
DosDateTimeToFileTime
CreateDirectoryA
MulDiv
GetLocalTime
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
GlobalAlloc
GlobalLock
GlobalUnlock
HeapSize
SetEndOfFile
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
GetTimeZoneInformation
GetProcessHeap
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
FlushFileBuffers
MoveFileExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
ReadConsoleW
GetConsoleMode
SetFilePointerEx
HeapReAlloc
ExitThread
HeapFree
HeapAlloc
WriteConsoleW
GetModuleHandleExW
ReadFileEx
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
CreateFileW
RaiseException
RtlUnwind
LoadLibraryW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualAlloc
LoadLibraryExW
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
ExpandEnvironmentStringsW
SignalObjectAndWait
CreateTimerQueue
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
DecodePointer
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
QueryPerformanceCounter
GetExitCodeThread
GetCurrentThread
GetCurrentThreadId
DeleteCriticalSection
WaitForSingleObjectEx
SetEvent
CreateEventW
DisconnectNamedPipe
WriteFileEx
CreateNamedPipeA
VirtualProtect
WideCharToMultiByte
GetCurrentProcessId
Process32FirstW
LockResource
GetSystemDirectoryA
Process32NextW
GetTempPathA
MultiByteToWideChar
GetVolumeInformationA
LeaveCriticalSection
GetModuleFileNameW
GetCurrentProcess
EnterCriticalSection
GetModuleFileNameA
GetSystemTimeAsFileTime
WaitNamedPipeA
VirtualFreeEx
CreateRemoteThread
GetModuleHandleW
VirtualAllocEx
GetVersionExW
WriteProcessMemory
CreateEventA
WaitForSingleObject
ExpandEnvironmentStringsA
LoadLibraryA
PeekNamedPipe
ReadFile
GetStdHandle
SizeofResource
GetFileType
WaitForMultipleObjects
GetProcAddress
FreeLibrary
SetLastError
GetVersionExA
SleepEx
CreateFileA
WriteFile
FormatMessageA
CreateToolhelp32Snapshot
Thread32First
Thread32Next
GetLastError
Sleep
ReleaseMutex
TryEnterCriticalSection
CreateMutexA
GetTickCount
LoadResource
ConnectNamedPipe
SwitchToThread
GetOverlappedResult
CloseHandle
DeleteFileA
OpenProcess
FreeResource
FindResourceA
FileTimeToSystemTime
user32
DestroyMenu
GetMonitorInfoA
MessageBoxA
GetWindowLongA
SetWindowLongA
TrackPopupMenu
CreatePopupMenu
ScreenToClient
PostMessageA
SetWindowRgn
MonitorFromWindow
SetWindowPos
IsWindowVisible
FindWindowA
EnumThreadWindows
SendMessageA
GetWindowTextA
GetWindowThreadProcessId
SystemParametersInfoW
ActivateKeyboardLayout
UnloadKeyboardLayout
LoadKeyboardLayoutA
PostMessageW
GetSystemMetrics
GetMessageA
TranslateMessage
DispatchMessageA
CreateWindowExA
IsWindow
DestroyWindow
CharNextA
SetFocus
LoadIconA
GetFocus
GetKeyState
SetCapture
ReleaseCapture
SetTimer
KillTimer
GetDC
ReleaseDC
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
MapWindowPoints
IntersectRect
UnionRect
IsRectEmpty
PtInRect
GetWindow
SetCursor
LoadCursorA
wvsprintfA
OffsetRect
DefWindowProcA
CallWindowProcA
RegisterClassA
RegisterClassExA
GetClassInfoExA
ShowWindow
GetParent
MoveWindow
GetWindowRect
GetCursorPos
IsIconic
SetForegroundWindow
PostQuitMessage
AppendMenuA
GetActiveWindow
SetCaretPos
EnableWindow
IsZoomed
SetPropA
GetPropA
LoadImageA
SetWindowTextA
GetWindowTextLengthA
GetCaretBlinkTime
GetGUIThreadInfo
InvalidateRgn
CreateAcceleratorTableA
GetSysColor
ClientToScreen
GetCaretPos
ShowCaret
HideCaret
CreateCaret
SetRect
FillRect
DrawTextA
CharPrevA
GetClientRect
gdi32
CreateCompatibleBitmap
CreateRoundRectRgn
DeleteObject
CombineRgn
CreateRectRgnIndirect
BitBlt
GetDeviceCaps
GdiFlush
ExtTextOutA
TextOutA
MoveToEx
CreateDIBSection
SetStretchBltMode
StretchBlt
SetBkColor
ExtSelectClipRgn
SelectClipRgn
RoundRect
LineTo
GetTextExtentPoint32A
GetClipBox
GetCharABCWidthsA
CreatePenIndirect
SetTextColor
SetBkMode
CreateSolidBrush
CreatePatternBrush
SetWindowOrgEx
GetTextMetricsA
SelectObject
SaveDC
RestoreDC
Rectangle
GetStockObject
DeleteDC
CreatePen
CreateFontIndirectA
CreateCompatibleDC
GetObjectA
advapi32
CryptGetHashParam
CryptReleaseContext
CryptCreateHash
CryptHashData
CryptDestroyHash
RegDeleteValueA
RegEnumValueA
RegFlushKey
RegOpenKeyA
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
CryptAcquireContextA
shell32
Shell_NotifyIconA
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoCreateGuid
CoInitialize
CoUninitialize
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CreateStreamOnHGlobal
oleaut32
SysAllocStringLen
SysFreeString
VariantInit
VariantClear
SysAllocString
gdiplus
GdipCreateLineBrushI
GdipDeleteBrush
GdipCloneBrush
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDrawString
GdipGetFamily
GdipDeleteFont
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipDeleteFontFamily
GdipDrawImageRectI
GdipDrawImage
GdipGraphicsClear
GdipSetInterpolationMode
GdipSetTextRenderingHint
GdipSetPixelOffsetMode
GdipSetSmoothingMode
GdipSetCompositingQuality
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
ws2_32
inet_ntoa
ioctlsocket
socket
send
WSAGetLastError
ntohs
recv
WSCGetProviderPath
WSCDeinstallProvider
WSCInstallProvider
WSCEnumProtocols
WSCWriteProviderOrder
sendto
recvfrom
gethostbyname
WSAIoctl
setsockopt
htons
getsockopt
connect
WSASetLastError
WSACleanup
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
select
shutdown
listen
getpeername
inet_addr
getsockname
imm32
ImmSetCompositionFontA
ImmReleaseContext
ImmGetContext
ImmInstallIMEW
ImmSetCompositionWindow
ImmIsIME
shlwapi
PathFileExistsA
comctl32
_TrackMouseEvent
ord17
Sections
.text Size: 943KB - Virtual size: 943KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 233KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ