Static task
static1
Behavioral task
behavioral1
Sample
a541ea11982f4f67742e0eea31a772af0f59940ef56bf175e0fcf10c31156818.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a541ea11982f4f67742e0eea31a772af0f59940ef56bf175e0fcf10c31156818.exe
Resource
win10v2004-20230220-en
General
-
Target
a541ea11982f4f67742e0eea31a772af0f59940ef56bf175e0fcf10c31156818
-
Size
556KB
-
MD5
4763fbd144b26832eaf5895c68e629e7
-
SHA1
fddc196e8a992ef658d77fb9d27087cace3e803b
-
SHA256
a541ea11982f4f67742e0eea31a772af0f59940ef56bf175e0fcf10c31156818
-
SHA512
55251c6236d1a85ca7524197356a6f66cc29f0cd4c21b665ba25007fff8a69758eb0a4dd1d8808228954050d9c13a41d548eb4ea78f96206a1c8f6f1d28056e9
-
SSDEEP
12288:oN5RL6znH0Wr2cYYdUXbKXK6o47/zTC7ttvHhNylDg9Bi5:IhQFcYdUWXK6oQTC77vt9Bi5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a541ea11982f4f67742e0eea31a772af0f59940ef56bf175e0fcf10c31156818
Files
-
a541ea11982f4f67742e0eea31a772af0f59940ef56bf175e0fcf10c31156818.exe windows x86
3192047094d07b34026fdfadabe97c35
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsFree
GlobalFlags
InterlockedIncrement
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetCPInfo
GetOEMCP
GetModuleHandleW
SetErrorMode
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
CreateThread
GetCommandLineA
GetStartupInfoA
RtlUnwind
ExitProcess
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
HeapSize
LocalReAlloc
GetFileType
GetACP
IsValidCodePage
GetTimeZoneInformation
VirtualFree
HeapCreate
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
CompareStringW
SetEnvironmentVariableA
GetLocaleInfoW
CreateFileW
GetProcessHeap
TlsAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsGetValue
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
GetThreadLocale
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageA
LocalFree
MulDiv
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
MultiByteToWideChar
lstrcmpW
lstrlenA
WritePrivateProfileStringA
FreeResource
GetCurrentProcessId
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
lstrcmpA
InterlockedDecrement
GetModuleFileNameW
SetLastError
GetStdHandle
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleA
GetTickCount
MoveFileExA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
ReadFile
GetFileSize
CreateFileA
ResetEvent
CreateEventA
ResumeThread
TerminateThread
GetCommandLineW
CreateMutexA
SetCurrentDirectoryA
SetEvent
CloseHandle
GetProcAddress
Sleep
FreeLibrary
LoadLibraryA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetNativeSystemInfo
GetVersionExA
GetModuleFileNameA
WaitForSingleObject
TerminateProcess
GetExitCodeProcess
GetLastError
CopyFileA
SetStdHandle
GetCurrentThreadId
user32
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetMenu
IsWindowVisible
UpdateWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
CallWindowProcA
PtInRect
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextA
GetFocus
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindow
SetWindowContextHelpId
MapDialogRect
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
PeekMessageA
DispatchMessageA
PostQuitMessage
UnhookWindowsHookEx
SetWindowPos
DestroyIcon
CreateWindowExA
RegisterClassExA
LoadIconA
SendMessageA
LoadCursorA
DefWindowProcA
RegisterWindowMessageA
PostThreadMessageA
EnableWindow
TrackPopupMenu
SetForegroundWindow
AppendMenuA
CreatePopupMenu
GetCursorPos
MessageBoxA
KillTimer
PostMessageA
DrawIcon
GetClientRect
GetSysColorBrush
DestroyMenu
GetCapture
MessageBeep
GetNextDlgGroupItem
GetSystemMetrics
IsIconic
RegisterClipboardFormatA
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
SetWindowsHookExA
SetCapture
UnregisterClassA
CharUpperA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
GetMessageA
TranslateMessage
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
WinHelpA
IsChild
GetDlgCtrlID
ReleaseCapture
gdi32
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
GetDeviceCaps
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
shell32
Shell_NotifyIconA
ShellExecuteA
CommandLineToArgvW
ShellExecuteExA
SHGetSpecialFolderPathA
comctl32
InitCommonControlsEx
shlwapi
PathIsUNCA
PathStripToRootA
UrlUnescapeA
PathFindExtensionA
UrlIsA
PathFindFileNameA
PathIsURLA
PathIsRelativeA
oledlg
ord8
ole32
StgCreateDocfileOnILockBytes
CLSIDFromProgID
CLSIDFromString
CoTaskMemFree
CoTaskMemAlloc
CoGetClassObject
StgOpenStorageOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysFreeString
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
SafeArrayDestroy
SysAllocString
VariantCopy
ws2_32
WSAStartup
WSASetLastError
WSACleanup
iphlpapi
GetAdaptersInfo
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
wininet
InternetOpenUrlA
InternetReadFile
InternetSetFilePointer
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetSetOptionExA
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetGetConnectedState
InternetSetStatusCallback
InternetWriteFile
wintrust
WinVerifyTrust
winhttp
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpConnect
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpReadData
WinHttpQueryDataAvailable
Sections
.text Size: 351KB - Virtual size: 350KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ