Static task
static1
Behavioral task
behavioral1
Sample
da5a40f1bced2a363c2e8e482d92c3830bdf73b3cdfd680dc99f7a649814a4c1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
da5a40f1bced2a363c2e8e482d92c3830bdf73b3cdfd680dc99f7a649814a4c1.exe
Resource
win10v2004-20230221-en
General
-
Target
da5a40f1bced2a363c2e8e482d92c3830bdf73b3cdfd680dc99f7a649814a4c1
-
Size
3.5MB
-
MD5
ca3f6b328ffa2f43c4c88ed173108368
-
SHA1
dbd7b9d00646b06716fcc8be7a51dbb85fd3c29e
-
SHA256
da5a40f1bced2a363c2e8e482d92c3830bdf73b3cdfd680dc99f7a649814a4c1
-
SHA512
37f850a3819a293629f95c96ac33b3a81d4294c90372ccf7781ed29c9177cef45ce390b2090ed457426546ed68c1c3fe6a668e16101637e95635e1de1666aa30
-
SSDEEP
49152:UHK+Rz4nVjx9FyDYQCt+LstBDig4KsBnvDCnlaWMsas0WmrT8c9Z5ARaCitwxLv5:i8VW7CpTDR4957ClKfl5Gamb5vlMWT9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da5a40f1bced2a363c2e8e482d92c3830bdf73b3cdfd680dc99f7a649814a4c1
Files
-
da5a40f1bced2a363c2e8e482d92c3830bdf73b3cdfd680dc99f7a649814a4c1.exe windows x86
2858a728b76eb0aa88697ff84000dfc6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
lstrcatW
lstrlenW
LoadLibraryExW
GetModuleHandleW
GetSystemDirectoryW
GetLastError
InitializeCriticalSection
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventW
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
LoadLibraryW
GetModuleFileNameW
LocalFree
FormatMessageW
GetCurrentProcessId
GetCurrentThreadId
SetLastError
SetFileTime
GetTickCount
GetCurrentDirectoryW
CreateDirectoryW
RemoveDirectoryW
CreateFileW
SetFileAttributesW
DeleteFileW
MoveFileW
FindClose
GetLogicalDriveStringsW
GetModuleHandleA
GetFileAttributesW
FindFirstFileW
FindNextFileW
GetFileSize
WriteFile
ReadFile
SetEndOfFile
SetFilePointer
CompareFileTime
GetVersionExW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetFileInformationByHandle
GetStdHandle
WaitForMultipleObjects
FileTimeToLocalFileTime
GetCurrentProcess
Sleep
SetPriorityClass
GetCommandLineW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
LCMapStringW
OutputDebugStringW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
WriteConsoleW
GetModuleFileNameA
GetFileType
HeapSize
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualFree
FileTimeToSystemTime
VirtualAlloc
GetModuleHandleExW
ExitProcess
GetProcessHeap
GetCommandLineA
HeapReAlloc
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
RtlUnwind
ExitThread
CreateThread
DecodePointer
EncodePointer
HeapAlloc
HeapFree
user32
ShowWindow
SendMessageW
CharUpperW
MoveWindow
LoadIconW
LoadCursorW
GetParent
SetCursor
KillTimer
SetTimer
IsDlgButtonChecked
CheckDlgButton
SetWindowTextW
InvalidateRect
EnableWindow
GetKeyState
SetFocus
SetDlgItemTextW
EndDialog
PostMessageW
MessageBoxW
GetWindowTextLengthW
GetWindowTextW
LoadStringW
SystemParametersInfoW
MapDialogRect
SetWindowLongW
GetWindowLongW
ScreenToClient
GetWindowRect
GetDlgItem
DialogBoxParamW
GetFocus
shell32
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
ole32
CoCreateInstance
OleInitialize
CoUninitialize
CoInitialize
oleaut32
SysFreeString
SysAllocStringLen
SysAllocString
SysStringLen
VariantClear
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ