Static task
static1
Behavioral task
behavioral1
Sample
4c9a6528c21f38b18b72047000662974ac7882670e82e3a61fb107e02ca16ff8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4c9a6528c21f38b18b72047000662974ac7882670e82e3a61fb107e02ca16ff8.exe
Resource
win10v2004-20230220-en
General
-
Target
4c9a6528c21f38b18b72047000662974ac7882670e82e3a61fb107e02ca16ff8
-
Size
1.9MB
-
MD5
e2804cec3d5d9a5034619b8d928be317
-
SHA1
272e7cafe8c4ef2d7537c31ca5cc445868617585
-
SHA256
4c9a6528c21f38b18b72047000662974ac7882670e82e3a61fb107e02ca16ff8
-
SHA512
3773795570fd80c1e36eb499b0ca69e4142953ef35d9e0fb78e1b8d88bfae7dc020e9417c9954f93bde025828bd29798c906d99650f66e96b19913cb27d2e781
-
SSDEEP
49152:r4ZSes1EPz05O4PhF2WMVm8C9d+VFfB96VmeOhWhe8zQLXQ3rMzwuHcW3QVQ+I1:7eIEPz0Q4Z8bVm8C9d+VhBoVmeOhWheg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c9a6528c21f38b18b72047000662974ac7882670e82e3a61fb107e02ca16ff8
Files
-
4c9a6528c21f38b18b72047000662974ac7882670e82e3a61fb107e02ca16ff8.exe windows x86
65ff4e478dd241f83f647b6c3e4fec29
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
uactmon
ord1
ord6
ord2
kernel32
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
ExitProcess
SetUnhandledExceptionFilter
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
GetStringTypeW
GetCPInfo
OutputDebugStringW
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
VirtualFree
VirtualAllocEx
LoadLibraryExW
SetStdHandle
GetFileType
VirtualQuery
ReadFile
GetModuleHandleExW
GetStdHandle
GetACP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
IsValidLocale
GetUserDefaultLCID
CreateProcessA
WriteFile
ResumeThread
TerminateProcess
LocalUnlock
LocalLock
LocalReAlloc
LocalAlloc
lstrcmpA
GlobalUnlock
GlobalLock
GlobalAlloc
GetVolumeInformationA
GetDriveTypeA
GetLogicalDriveStringsA
EnumSystemLocalesW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
FileTimeToLocalFileTime
GetFileTime
SetErrorMode
GetSystemDirectoryA
GetLongPathNameA
lstrcpyA
lstrcpynA
GetCurrentProcessId
GetDiskFreeSpaceExA
CreateFileMappingA
UnmapViewOfFile
MapViewOfFile
VirtualAlloc
GetWindowsDirectoryA
WaitForSingleObject
GetDateFormatA
GetTimeFormatA
GetLocaleInfoA
GetVersionExA
GetTempFileNameA
GetTempPathA
lstrlenA
IsDBCSLeadByte
FindResourceA
GetCommandLineA
GetModuleFileNameA
LoadLibraryExA
CreateMutexA
lstrcmpiA
CreateThread
DecodePointer
InitializeCriticalSectionAndSpinCount
SetLastError
GetLastError
GetCurrentThreadId
FindResourceExW
FindResourceW
FormatMessageA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
MulDiv
SizeofResource
LoadResource
RaiseException
FreeLibrary
LockResource
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
IsBadReadPtr
SearchPathA
CreateFileW
GetLocaleInfoW
LoadLibraryA
GetSystemInfo
VirtualProtect
GetVersion
GetModuleHandleA
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
Sleep
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetCurrentProcess
OpenProcess
LocalFree
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
CreateFileA
CloseHandle
GetFileAttributesA
ExpandEnvironmentStringsA
FlushFileBuffers
GetConsoleCP
WriteConsoleW
RtlUnwind
SetEndOfFile
user32
SetCaretPos
ShowCaret
CreateCaret
EnableScrollBar
ShowScrollBar
DragDetect
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
GetCursor
InsertMenuItemA
InsertMenuA
DialogBoxParamA
GetDesktopWindow
LoadStringW
MessageBeep
TrackPopupMenuEx
RemoveMenu
CreatePopupMenu
PostQuitMessage
PeekMessageA
CreateIconFromResourceEx
RegisterWindowMessageA
DestroyCaret
wsprintfA
GetComboBoxInfo
MonitorFromPoint
SystemParametersInfoA
GetScrollInfo
SetScrollInfo
LoadStringA
DrawIconEx
LoadImageA
DestroyIcon
LoadIconA
DestroyCursor
LoadCursorA
LoadBitmapA
CheckMenuRadioItem
PtInRect
EqualRect
IsRectEmpty
OffsetRect
IntersectRect
InflateRect
SetRectEmpty
SetRect
FrameRect
FillRect
GetSysColor
SetCursor
GetWindowTextLengthA
GetWindowTextA
GetScrollPos
SetScrollPos
SetWindowRgn
EndPaint
BeginPaint
ReleaseDC
GetWindowDC
GetDC
UpdateWindow
DrawTextA
SetMenuDefaultItem
SetMenuItemInfoA
GetMenuItemInfoA
TrackPopupMenu
ModifyMenuA
GetMenuItemCount
GetSubMenu
DestroyMenu
IsIconic
RegisterDeviceNotificationA
UnregisterDeviceNotification
SetForegroundWindow
GetClassLongA
GetMessageA
DispatchMessageA
WaitMessage
GetMenuStringA
LoadMenuA
GetSystemMetrics
TranslateAcceleratorA
LoadAcceleratorsA
IsWindowEnabled
KillTimer
SetTimer
ReleaseCapture
SetCapture
GetCapture
GetAsyncKeyState
GetKeyState
GetFocus
GetDoubleClickTime
TranslateMessage
FindWindowExA
WaitForInputIdle
GetDlgItemTextA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
GetTopWindow
SetParent
WindowFromPoint
SetCursorPos
GetClassNameA
GetActiveWindow
RegisterClipboardFormatA
GetDlgCtrlID
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
IsChild
IsMenu
GetClassInfoExA
RegisterClassExA
CallWindowProcA
DefWindowProcA
GetMessagePos
DrawFrameControl
DrawEdge
WindowFromDC
IsZoomed
GetCursorPos
FindWindowA
MessageBoxA
CharNextA
PostMessageA
IsDialogMessageA
CopyRect
ScreenToClient
ClientToScreen
AdjustWindowRectEx
EnableWindow
SetFocus
CreateDialogParamA
BringWindowToTop
MoveWindow
UnregisterClassA
SetWindowLongA
GetSysColorBrush
SetWindowTextA
RedrawWindow
InvalidateRect
SetDlgItemTextA
GetDlgItem
ShowWindow
DestroyWindow
IsWindow
CreateWindowExA
SendMessageA
GetMonitorInfoA
MonitorFromWindow
GetWindow
GetWindowLongA
MapWindowPoints
GetClientRect
EndDialog
SetWindowPos
GetWindowThreadProcessId
GetParent
GetWindowRect
IsWindowVisible
AppendMenuA
gdi32
Polyline
SelectClipRgn
Rectangle
IntersectClipRect
GetClipRgn
GetDeviceCaps
GetBkMode
GetBkColor
GetTextExtentExPointA
TextOutA
SetBoundsRect
GetCharWidthA
OffsetWindowOrgEx
SetWindowOrgEx
SetViewportOrgEx
Polygon
CreatePolygonRgn
ExtTextOutA
MoveToEx
GetTextMetricsA
SetTextColor
SetPixelV
SetBkMode
SetBkColor
SelectObject
SaveDC
RoundRect
RestoreDC
PatBlt
LineTo
GetTextExtentPoint32A
GetStockObject
GetClipBox
DeleteDC
CreateSolidBrush
CreateRectRgn
CreatePatternBrush
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
CombineRgn
BitBlt
GetObjectA
CreateFontIndirectA
DeleteObject
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegCloseKey
OpenProcessToken
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
EnumServicesStatusA
StartServiceA
QueryServiceStatusEx
ControlService
QueryServiceConfig2A
QueryServiceConfigA
OpenServiceA
OpenSCManagerA
EnumServicesStatusExA
CloseServiceHandle
RegQueryInfoKeyW
RegSetValueExA
RegQueryValueExA
shell32
DragAcceptFiles
DragQueryFileA
SHGetDesktopFolder
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
SHGetFileInfoA
ShellExecuteA
ole32
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
OleInitialize
OleUninitialize
CoTaskMemAlloc
DoDragDrop
oleaut32
VarUI4FromStr
shlwapi
StrFormatByteSize64A
PathGetDriveNumberA
PathFileExistsA
comctl32
ImageList_Destroy
ImageList_GetImageCount
ImageList_ReplaceIcon
ImageList_Draw
ImageList_AddMasked
ImageList_DrawEx
ImageList_Remove
ImageList_GetIcon
ImageList_LoadImageA
ImageList_GetIconSize
_TrackMouseEvent
ImageList_GetImageInfo
InitCommonControlsEx
ImageList_Create
msimg32
GradientFill
AlphaBlend
dbghelp
MiniDumpWriteDump
daemon
dispent_template_register
daemon_alloc
dispent_alloc
dispent_free
dispent_bind_daemon
tasks_lock
tasks_unlock
usysdiag
vif_iokit_get
vif_autorun_get
vif_sysutils_get
vif_assist_get
vif_hooklet_get
vif_get
uxtheme
CloseThemeData
OpenThemeData
SetWindowTheme
DrawThemeBackground
userenv
GetProfilesDirectoryA
selfprot
disable_msg_inject
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 111KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 376B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 253KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 67KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ