Static task
static1
Behavioral task
behavioral1
Sample
d19ef1eca30b6bfb044fbd6220c84a1a9ea7893b7cd414cc74b5efccc0253bdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d19ef1eca30b6bfb044fbd6220c84a1a9ea7893b7cd414cc74b5efccc0253bdf.exe
Resource
win10v2004-20230220-en
General
-
Target
d19ef1eca30b6bfb044fbd6220c84a1a9ea7893b7cd414cc74b5efccc0253bdf
-
Size
420KB
-
MD5
740e504e9b75654d6e256e51d6d39bc4
-
SHA1
1a2c109641a8de9b53f99b54aa9ad5c95e9613a8
-
SHA256
d19ef1eca30b6bfb044fbd6220c84a1a9ea7893b7cd414cc74b5efccc0253bdf
-
SHA512
634c9f2b38143648316363a89c3c896b870aa9164943a0483e904341ee967025a36b7c40044e58d1e964325bdb4e46797963f390de9ab0786ffc509621ff0b2f
-
SSDEEP
6144:jX8LBb+T5plxhAm+U02SZU8JUCwbGkyCG0ah0QAS040qN7JVGjmR5O2fEjVouvgt:jX8LBb+TRfx+iOOG67
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d19ef1eca30b6bfb044fbd6220c84a1a9ea7893b7cd414cc74b5efccc0253bdf
Files
-
d19ef1eca30b6bfb044fbd6220c84a1a9ea7893b7cd414cc74b5efccc0253bdf.exe windows x86
4ba5550139f78be40362ae765a33972b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsW
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
UnhandledExceptionFilter
HeapAlloc
RaiseException
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
FreeEnvironmentStringsA
HeapFree
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GetCPInfo
SetErrorMode
GetThreadLocale
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStartupInfoA
TerminateProcess
GetCommandLineA
RtlUnwind
FormatMessageA
GetFileSize
GetFileTime
FileTimeToLocalFileTime
GetFileAttributesA
GetTickCount
FileTimeToSystemTime
GetVolumeInformationA
GetFullPathNameA
UnlockFile
SetEndOfFile
SetFilePointer
LockFile
FlushFileBuffers
DuplicateHandle
ReadFile
GetCurrentProcess
GetOEMCP
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
ExitProcess
FindFirstFileA
FindClose
DeleteFileA
lstrcpyA
lstrlenA
lstrcatA
GetVersionExA
FindResourceA
LoadResource
LockResource
CreateFileA
GetLastError
SetFileAttributesA
SizeofResource
WriteFile
CloseHandle
Sleep
GetSystemDirectoryA
GetProcessVersion
GetProfileStringA
WritePrivateProfileStringA
GlobalFlags
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
MulDiv
SetLastError
LoadLibraryA
FreeLibrary
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GetProcAddress
GlobalUnlock
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
VirtualAlloc
GetWindowsDirectoryA
user32
InvalidateRect
CharUpperA
InflateRect
RegisterClipboardFormatA
PostThreadMessageA
SetRect
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
PtInRect
GetClassNameA
GetDesktopWindow
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
DestroyMenu
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetNextDlgGroupItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
MapDialogRect
SetWindowPos
GetWindow
SetWindowContextHelpId
LoadStringA
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
MessageBeep
GetMenuItemID
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
PostQuitMessage
PostMessageA
RedrawWindow
GetSysColor
EnableWindow
LoadCursorA
SetCursor
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
SendMessageA
LoadIconA
MessageBoxA
wsprintfA
DrawFocusRect
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
gdi32
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetMapMode
PatBlt
CreateDIBitmap
CreateCompatibleDC
BitBlt
GetTextExtentPointA
IntersectClipRect
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetViewportExtEx
SetMapMode
SetBkMode
SelectObject
RestoreDC
GetStockObject
DeleteDC
SaveDC
SetBkColor
SetTextColor
GetObjectA
CreateBitmap
GetClipBox
DeleteObject
CreateSolidBrush
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
DeleteService
ControlService
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegDeleteKeyA
QueryServiceStatus
StartServiceA
CreateServiceA
RegQueryValueExA
comctl32
ord17
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoTaskMemAlloc
olepro32
ord253
oleaut32
SysStringLen
SysAllocStringByteLen
VariantCopy
SysAllocString
VariantChangeType
VariantTimeToSystemTime
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE