Static task
static1
Behavioral task
behavioral1
Sample
f59d0aae0b3e672167f7b83cdcce19ca772ab2456413b06c9398e830c440ee10.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f59d0aae0b3e672167f7b83cdcce19ca772ab2456413b06c9398e830c440ee10.exe
Resource
win10v2004-20230220-en
General
-
Target
f59d0aae0b3e672167f7b83cdcce19ca772ab2456413b06c9398e830c440ee10
-
Size
4.1MB
-
MD5
f168b280c7abb068a571c0a1e70360c9
-
SHA1
011497dcf94c5d82aaef76b29fb963ab2a4be7c9
-
SHA256
f59d0aae0b3e672167f7b83cdcce19ca772ab2456413b06c9398e830c440ee10
-
SHA512
a50f1648bc0f029a02d4df470df05fb43eec044879acc00a2d40e41e822acd6dd1e0a5b97e3df9a1e4b2780899b9fef3faabea742b4659cf84de567c46fd55f1
-
SSDEEP
98304:E5lfU5/w4VxUYOEiRYNbGdCqou+fBXzRZlCt9SmNt:E5GXx+PYGOu+JDRDIwu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f59d0aae0b3e672167f7b83cdcce19ca772ab2456413b06c9398e830c440ee10
Files
-
f59d0aae0b3e672167f7b83cdcce19ca772ab2456413b06c9398e830c440ee10.exe windows x86
adb110edc219e7b4b05721d3949559c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord815
ord641
ord2514
ord2621
ord1134
ord5265
ord4376
ord4853
ord4998
ord4710
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord4234
ord1146
ord1168
ord2302
ord6199
ord4160
ord2863
ord4224
ord2379
ord755
ord470
ord6197
ord2086
ord4129
ord5710
ord2820
ord3811
ord941
ord1200
ord4538
ord2575
ord5290
ord3402
ord3619
ord6055
ord1776
ord4396
ord3574
ord809
ord609
ord556
ord567
ord3663
ord3626
ord2414
ord4275
ord1641
ord561
ord4480
ord3874
ord1088
ord2122
ord5875
ord2859
ord3089
ord6358
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord616
ord3317
ord668
ord1980
ord3181
ord4058
ord2781
ord2770
ord356
ord940
ord5645
ord3178
ord3185
ord1158
ord3721
ord795
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord692
ord3337
ord4277
ord3610
ord656
ord3092
ord2645
ord4476
ord640
ord2405
ord323
ord5789
ord6172
ord5148
ord3571
ord5785
ord1640
ord5787
ord283
ord5788
ord472
ord4133
ord4297
ord665
ord1979
ord6385
ord353
ord3361
ord4287
ord4123
ord2642
ord3803
ord6379
ord6283
ord6282
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4673
ord6648
ord926
ord536
ord389
ord5207
ord1988
ord6663
ord690
ord2764
ord6877
ord4278
ord939
ord825
ord823
ord2078
ord4284
ord6215
ord2116
ord2089
ord2099
ord2080
ord2864
ord6880
ord4299
ord922
ord858
ord2818
ord537
ord860
ord535
ord540
ord924
ord800
ord2860
ord2915
ord1576
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
strncpy
_setmbcp
_stat
_getw
__CxxFrameHandler
_mbscmp
atoi
isspace
free
malloc
sprintf
exit
fread
ftell
fclose
fwrite
fseek
fopen
_fsopen
_vsnprintf
_ftol
strstr
calloc
_mbsstr
_mbsnbcpy
wcslen
wcscpy
_mbsicmp
rand
srand
_controlfp
kernel32
LoadLibraryA
GetProcAddress
GetFileAttributesA
SetFileTime
WriteFile
WideCharToMultiByte
GetTickCount
FileTimeToSystemTime
GetFileSize
FreeLibrary
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetLocalTime
FindClose
FindNextFileA
FindFirstFileA
GetModuleHandleA
CloseHandle
DeviceIoControl
CreateFileA
GetVersionExA
GetVolumeInformationA
Sleep
CreateDirectoryA
CreateThread
GetModuleFileNameA
ReadFile
CreateProcessA
GetStartupInfoA
CreatePipe
lstrcpyA
CopyFileA
DeleteFileA
RemoveDirectoryA
GetWindowsDirectoryA
GetTempPathA
lstrlenA
MultiByteToWideChar
IsDBCSLeadByte
SetFilePointer
SystemTimeToFileTime
GetFileInformationByHandle
LocalFileTimeToFileTime
GetCurrentDirectoryA
user32
GetFocus
FillRect
SetWindowLongA
wsprintfA
GetWindowTextA
EnumWindows
GetDesktopWindow
SetRectEmpty
LoadImageA
InvalidateRect
DrawFocusRect
CopyRect
IsWindow
GetSysColor
GetDC
GetKeyState
PtInRect
ReleaseDC
EnableWindow
IsWindowVisible
GetWindowLongA
GetAsyncKeyState
SetWindowPos
KillTimer
GetCursorPos
GetWindowRect
SetTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
GetCaretPos
ScreenToClient
GetParent
SendMessageA
LoadIconA
IsRectEmpty
gdi32
DeleteDC
RoundRect
GetStockObject
Rectangle
StretchBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
BitBlt
CreateSolidBrush
GetCharWidthA
GetTextExtentPoint32A
SetStretchBltMode
SetBrushOrgEx
GetObjectA
CreateFontIndirectA
CreateFontA
CreateDCA
GetDeviceCaps
SelectObject
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegSetValueExA
shell32
SHGetSpecialFolderPathA
gdiplus
GdipDeleteBrush
GdipAlloc
GdipCloneBrush
GdipCreateSolidFill
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipDrawImageRectRectI
GdipGetImageHeight
GdipCreateStringFormat
GdipCreateHBITMAPFromBitmap
GdipGraphicsClear
GdipCreateHICONFromBitmap
GdipCreateBitmapFromFile
GdipFree
GdipFillRectangleI
GdipCloneImage
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipDrawString
GdipDrawImageI
GdipDeleteStringFormat
GdipLoadImageFromFile
GdipCreateFromHDC
GdipSetInterpolationMode
GdipSetPixelOffsetMode
GdipCreateFont
GdipDeleteGraphics
GdipDisposeImage
GdipGetImageWidth
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipDeleteFont
GdiplusStartup
GdipDrawImageRectI
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
ws2_32
htons
socket
send
WSACleanup
WSAStartup
recv
connect
inet_addr
gethostbyname
Sections
.text Size: 340KB - Virtual size: 337KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ