Static task
static1
Behavioral task
behavioral1
Sample
da0992611574e2f411eb288fa5595f6343686f9b0896224585d5cea880713dc3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
da0992611574e2f411eb288fa5595f6343686f9b0896224585d5cea880713dc3.exe
Resource
win10v2004-20230220-en
General
-
Target
da0992611574e2f411eb288fa5595f6343686f9b0896224585d5cea880713dc3
-
Size
176KB
-
MD5
931223cc2d1ec883a687d26097583471
-
SHA1
68f0045c333b1697829a1e0246924edd8a38eff9
-
SHA256
da0992611574e2f411eb288fa5595f6343686f9b0896224585d5cea880713dc3
-
SHA512
db3a14f1f0eb1dc146a3adb91a875641b04071d41febf197a1fbf9c2ffbee8544d58650cbca6669cdd1a82d2bf2848059aaed16b005392b252620bd9b508520d
-
SSDEEP
3072:nP7KERBMjl87IFivBhJvg4iVz2+5IEuNIR04:TKFjl8vpDigKh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da0992611574e2f411eb288fa5595f6343686f9b0896224585d5cea880713dc3
Files
-
da0992611574e2f411eb288fa5595f6343686f9b0896224585d5cea880713dc3.exe windows x86
bf55384a4b046b8d44d26784bf678e12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetThreadPriority
CreateThread
Sleep
GetComputerNameA
ReadFile
SetFilePointer
GetFileAttributesA
ReleaseSemaphore
CreateSemaphoreA
GetWindowsDirectoryA
GetSystemTimeAsFileTime
SearchPathA
GetModuleHandleA
GetSystemDirectoryA
GetDriveTypeA
GetLocalTime
FormatMessageA
GetCommandLineA
WaitForSingleObject
GetCurrentThreadId
SetStdHandle
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
ExitThread
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
TerminateProcess
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
ExitProcess
GetStartupInfoA
RtlUnwind
HeapAlloc
HeapFree
SuspendThread
ResumeThread
GetVersion
GetCurrentDirectoryA
SetCurrentDirectoryA
GetLogicalDrives
DeleteFileA
SetFileAttributesA
GetFileSize
WriteFile
SetEndOfFile
CreateFileA
CloseHandle
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetLastError
FreeLibrary
GetEnvironmentStringsW
SetLastError
user32
DeleteMenu
LoadImageA
FindWindowExA
SetClassLongA
RegisterWindowMessageA
CreatePopupMenu
UnregisterHotKey
SendMessageA
WinHelpA
GetCursorPos
ModifyMenuA
GetMenuItemCount
InsertMenuA
GetSubMenu
TrackPopupMenu
PostMessageA
RemoveMenu
LoadIconA
GetMenuStringA
GetMenuItemID
GetSystemMenu
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetForegroundWindow
BringWindowToTop
GetSystemMetrics
DestroyMenu
RegisterHotKey
GetMenuItemInfoA
AppendMenuA
KillTimer
IsWindow
EndDialog
SendDlgItemMessageA
SetWindowTextA
IsWindowVisible
GetParent
CallWindowProcA
GetClientRect
ScreenToClient
GetWindow
SetWindowLongA
SetTimer
GetWindowTextA
GetWindowRect
SetWindowPos
LoadStringA
GetDesktopWindow
MessageBeep
IsWindowEnabled
CheckDlgButton
IsDlgButtonChecked
ShowWindow
SetFocus
DialogBoxParamA
GetDlgItemTextA
SetDlgItemTextA
GetDlgItem
GetWindowTextLengthA
EnableWindow
MessageBoxA
GetWindowLongA
LoadMenuA
comdlg32
GetOpenFileNameA
CommDlgExtendedError
GetSaveFileNameA
advapi32
CryptDestroyKey
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptGenRandom
RegCloseKey
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
CryptReleaseContext
CryptDestroyHash
CryptDecrypt
CryptAcquireContextA
shell32
Shell_NotifyIconA
SHFormatDrive
mpr
WNetAddConnection3A
comctl32
PropertySheetA
ord17
CreatePropertySheetPageA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE