Static task
static1
Behavioral task
behavioral1
Sample
39b8b1a325bb860f8991a78ac952d681fb4a60b901a757fe7de728d70a33d006.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
39b8b1a325bb860f8991a78ac952d681fb4a60b901a757fe7de728d70a33d006.exe
Resource
win10v2004-20230220-en
General
-
Target
39b8b1a325bb860f8991a78ac952d681fb4a60b901a757fe7de728d70a33d006
-
Size
1.5MB
-
MD5
7c18cfba9a6be844e9b863e06d1a13a3
-
SHA1
c0f99fb01072873e3c7e669afc6783ec789d5e79
-
SHA256
39b8b1a325bb860f8991a78ac952d681fb4a60b901a757fe7de728d70a33d006
-
SHA512
5660046b6b4f6e03a18031544eb2e360dda3624fc342db99cfa907cebce1c2950163ff4e82e5f994abe895303025c6359fbb6dc586474685ae9fb674d7d53e67
-
SSDEEP
24576:EQJTSwd0rNSHLjEcIOMBELTbTB1eM4PrpQ6ZyfNGbAR7c7MM2Nyg:hcrNKIzBEfbt1eM4PrpRyNGbqc/MJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39b8b1a325bb860f8991a78ac952d681fb4a60b901a757fe7de728d70a33d006
Files
-
39b8b1a325bb860f8991a78ac952d681fb4a60b901a757fe7de728d70a33d006.exe windows x86
b207ff4da0d2506e35f971091df26e37
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
CreateMutexA
OutputDebugStringA
FreeLibrary
MultiByteToWideChar
GetSystemDirectoryA
Sleep
ReadFile
GetFileSize
CreateFileA
GlobalMemoryStatusEx
Process32Next
IsBadWritePtr
GetCurrentProcess
lstrlenW
WriteFile
TerminateProcess
GetModuleFileNameW
SetFilePointer
CreateFileW
GetCurrentThreadId
FormatMessageW
lstrcatW
LoadLibraryW
GetLocalTime
GetCurrentProcessId
CreateProcessW
GetModuleHandleW
lstrcpyW
GetTickCount
VirtualQuery
IsDebuggerPresent
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
EncodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
OutputDebugStringW
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
IsProcessorFeaturePresent
OpenMutexA
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
LoadLibraryExW
InterlockedPushEntrySList
Process32First
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
HeapReAlloc
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetCurrentThread
HeapSize
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
ReadConsoleW
SetStdHandle
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
WriteConsoleW
GetProcessHeap
SetConsoleCtrlHandler
GetTimeZoneInformation
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
TerminateThread
CreateThread
SetEndOfFile
CreateToolhelp32Snapshot
WideCharToMultiByte
CopyFileA
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
ReadProcessMemory
OpenProcess
DeleteCriticalSection
GetStartupInfoW
GetTempPathW
GetSystemDirectoryW
Process32NextW
Process32FirstW
OpenMutexW
CreateDirectoryW
SetFileTime
GetProcessId
WaitForSingleObject
GetFileAttributesW
SetFileAttributesW
GetFileAttributesExW
FileTimeToSystemTime
GlobalAlloc
DeleteFileW
GlobalFree
MoveFileExW
SystemTimeToFileTime
CopyFileW
GetTempFileNameW
GetFileTime
GetExitCodeProcess
DuplicateHandle
ExitThread
LocalFree
QueryDosDeviceW
FindFirstFileW
RemoveDirectoryW
GetLogicalDriveStringsW
LocalAlloc
CreateMutexW
ReleaseMutex
GetVersionExW
GetWindowsDirectoryW
VirtualAlloc
QueryPerformanceFrequency
InitializeCriticalSection
OpenFileMappingW
UnmapViewOfFile
FlushViewOfFile
CreateFileMappingW
MapViewOfFile
ResumeThread
FreeLibraryAndExitThread
InitializeCriticalSectionEx
GetLastError
RaiseException
CloseHandle
DecodePointer
CreateDirectoryA
InterlockedFlushSList
SetEnvironmentVariableW
user32
MonitorFromPoint
GetWindowLongW
UnregisterClassW
WindowFromPoint
TranslateMessage
MsgWaitForMultipleObjectsEx
PeekMessageW
DispatchMessageW
wsprintfW
GetWindowRect
ReleaseDC
GetWindowThreadProcessId
GetFocus
GetForegroundWindow
GetSystemMetrics
SetRectEmpty
MessageBoxW
SendMessageTimeoutW
GetDC
IsWindowVisible
UnregisterClassA
SetWindowPos
MonitorFromRect
ShowWindow
wvsprintfW
GetMonitorInfoW
AttachThreadInput
EnumWindows
GetClassNameW
GetDesktopWindow
FindWindowExW
SystemParametersInfoW
GetParent
IsIconic
SetForegroundWindow
advapi32
RegEnumValueW
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
BuildExplicitAccessWithNameW
RegOpenKeyExA
RegCloseKey
GetNamedSecurityInfoW
SetNamedSecurityInfoW
SetEntriesInAclW
SetSecurityDescriptorSacl
GetTokenInformation
LookupAccountSidW
OpenProcessToken
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegOpenKeyW
RegQueryValueExW
RegQueryValueExA
InitializeSecurityDescriptor
RegDeleteValueW
RegCreateKeyExW
RegFlushKey
RegQueryInfoKeyW
RegEnumKeyW
GetLengthSid
AddAccessAllowedAceEx
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
InitializeAcl
imm32
ImmDisableIME
wininet
InternetCloseHandle
InternetConnectA
InternetOpenUrlA
InternetReadFile
InternetSetOptionA
HttpOpenRequestA
HttpEndRequestA
InternetOpenA
HttpSendRequestA
HttpAddRequestHeadersA
HttpQueryInfoA
psapi
GetModuleInformation
GetProcessMemoryInfo
GetModuleFileNameExW
gdi32
SelectObject
CreateDIBSection
CreateCompatibleDC
StretchBlt
GetDeviceCaps
BitBlt
DeleteDC
DeleteObject
shell32
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
SHGetSpecialFolderPathW
SHFileOperationW
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantInit
VariantClear
SysAllocString
SysFreeString
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ndlv Size: 195KB - Virtual size: 195KB
IMAGE_SCN_MEM_EXECUTE