Static task
static1
Behavioral task
behavioral1
Sample
1b9d105ef0beaafc4c8c32fa995a376884a063074fb2b6a1817804a167a74a02.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1b9d105ef0beaafc4c8c32fa995a376884a063074fb2b6a1817804a167a74a02.exe
Resource
win10v2004-20230220-en
General
-
Target
1b9d105ef0beaafc4c8c32fa995a376884a063074fb2b6a1817804a167a74a02
-
Size
304KB
-
MD5
68baac6f5cdf26be4c4573f1858336dc
-
SHA1
9a64cbc7932c09aea1d6a52570b82179a3ea1571
-
SHA256
1b9d105ef0beaafc4c8c32fa995a376884a063074fb2b6a1817804a167a74a02
-
SHA512
2b38e108588982cc7cdcf3c3c31727a3c1a5ea04012c9f94aab54eb42e453bc7f8612a9dc51afee8f703fb9faf5c81899c49f376c50c778d45e50f67dabc8989
-
SSDEEP
6144:8LfZVSd7OQ7IkSn7RiMPlIQKjpucL7Cfnk:ofZVbQUkQIlL7Cfnk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b9d105ef0beaafc4c8c32fa995a376884a063074fb2b6a1817804a167a74a02
Files
-
1b9d105ef0beaafc4c8c32fa995a376884a063074fb2b6a1817804a167a74a02.exe windows x86
74e5c5077c8416c077b240acd6c07477
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
SetStdHandle
ExitThread
GetFileType
HeapReAlloc
HeapSize
HeapFree
CreateThread
SetHandleCount
GetTimeZoneInformation
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetACP
GetStdHandle
CreateEventA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
RtlUnwind
HeapAlloc
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
FindClose
CopyFileA
lstrcmpA
GetTempPathA
GetTempFileNameA
lstrcmpiA
GetPrivateProfileStringA
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileSectionNamesA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrlenA
lstrcatA
Sleep
WaitForSingleObject
lstrcpyA
SetEvent
ResetEvent
CloseHandle
GetProfileStringA
SetErrorMode
GetFileTime
GetFileSize
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetOEMCP
GetCPInfo
GetProcessVersion
SizeofResource
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetFullPathNameA
GetVolumeInformationA
DeleteFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GlobalAlloc
GetCurrentThread
GetModuleFileNameA
MulDiv
GetVersion
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
lstrcpynA
GetLastError
SetLastError
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
CreateDirectoryA
GetCurrentDirectoryA
WinExec
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
FindFirstFileA
FindNextFileA
IsBadReadPtr
IsBadWritePtr
UnhandledExceptionFilter
SetUnhandledExceptionFilter
user32
SendDlgItemMessageA
MapWindowPoints
GetFocus
AdjustWindowRectEx
CopyRect
IsWindowVisible
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
GetWindowTextLengthA
GetDlgCtrlID
DefWindowProcA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
RegisterWindowMessageA
wvsprintfA
ValidateRect
GetNextDlgTabItem
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
IsWindowEnabled
UnhookWindowsHookEx
LoadStringA
DrawTextExA
SetWindowPos
ClientToScreen
ScreenToClient
CreateWindowExA
GetWindowTextA
EndDialog
SetFocus
LoadCursorA
CopyIcon
GetParent
GetDC
ReleaseDC
InflateRect
InvalidateRect
IsWindow
SetWindowLongA
SetCursor
PtInRect
ReleaseCapture
RedrawWindow
SetCapture
DestroyCursor
GetSysColor
ShowWindow
UpdateWindow
GetLastActivePopup
WindowFromPoint
DestroyMenu
CharUpperA
GetMessageA
SetForegroundWindow
PeekMessageA
TranslateMessage
DispatchMessageA
PostQuitMessage
wsprintfA
GetCursorPos
LoadMenuA
GetSubMenu
GetWindow
GetClassNameA
GetDlgItem
SetWindowTextA
GetSysColorBrush
OffsetRect
IntersectRect
GetMessagePos
GetForegroundWindow
IsIconic
GetSystemMetrics
DrawIcon
LoadIconA
PostMessageA
MessageBeep
SendMessageA
EnableWindow
GetWindowRect
GetClientRect
TabbedTextOutA
GrayStringA
GetWindowDC
EndPaint
BeginPaint
GetMenuState
GetMenuCheckMarkDimensions
LoadBitmapA
CheckMenuItem
ModifyMenuA
SetMenuItemBitmaps
IsDialogMessageA
EnableMenuItem
MoveWindow
SystemParametersInfoA
GetWindowPlacement
GetKeyState
DrawTextA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
CharNextA
IsWindowUnicode
gdi32
GetObjectA
GetClipBox
SetTextColor
SetBkColor
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
GetStockObject
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
CreateDIBitmap
CreateCompatibleDC
BitBlt
CreateFontIndirectA
GetTextExtentPoint32A
GetTextExtentPointA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
shell32
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
SHBrowseForFolderA
comctl32
ord17
wsock32
gethostbyname
bind
listen
send
shutdown
inet_ntoa
socket
ioctlsocket
htons
connect
closesocket
setsockopt
select
__WSAFDIsSet
recv
inet_addr
WSAStartup
WSAGetLastError
WSACleanup
gethostname
accept
ntohs
getsockname
Sections
.text Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE