?RunProg@@YA?AVCString@@V1@K@Z
Static task
static1
Behavioral task
behavioral1
Sample
69b22c0c3025382ef126d63945f91e51063ec1a2e93ca105d3c7326ac5e1a0ee.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
69b22c0c3025382ef126d63945f91e51063ec1a2e93ca105d3c7326ac5e1a0ee.exe
Resource
win10v2004-20230621-en
General
-
Target
69b22c0c3025382ef126d63945f91e51063ec1a2e93ca105d3c7326ac5e1a0ee
-
Size
160KB
-
MD5
87377773fe1b5c5e662cb258dc0da794
-
SHA1
6b4b64023e0c733d4998b9ffdbe539f910f8dace
-
SHA256
69b22c0c3025382ef126d63945f91e51063ec1a2e93ca105d3c7326ac5e1a0ee
-
SHA512
57dd5a4a9225dfede236a6afffdf4bc8e3bbbf6f8493a6ab58e18b92c703df443eccf0fd39e6b5f6a1e008bba431697f321377247dd62b2a0fcb853f7e3bf614
-
SSDEEP
3072:BaXQU86UJnaiT0iIaqhJv/gJKivqmd9kZFrwvTnoIa3AZFilA:ByAYiIaqhlIJ3fcZ81ZU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69b22c0c3025382ef126d63945f91e51063ec1a2e93ca105d3c7326ac5e1a0ee
Files
-
69b22c0c3025382ef126d63945f91e51063ec1a2e93ca105d3c7326ac5e1a0ee.exe windows x86
c22c2e50da2e6e4bc6a1a337a07388c4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
ExitThread
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapSize
GetACP
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
ExitProcess
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapAlloc
HeapFree
RtlUnwind
GetFullPathNameA
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
GlobalFlags
lstrcmpA
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalAlloc
GlobalReAlloc
GlobalHandle
GlobalFree
TlsAlloc
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalLock
GlobalUnlock
FindNextFileA
lstrcpyA
FindFirstFileA
SetLastError
FindClose
lstrcpynA
ReleaseMutex
CreateMutexA
CreateEventA
SuspendThread
SetThreadPriority
SetEvent
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
lstrlenW
GetCurrentThread
GetCurrentProcess
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
GetCommandLineA
lstrcmpiA
GetCurrentThreadId
Sleep
GetPrivateProfileIntA
GetPrivateProfileStringA
GetModuleFileNameA
FreeLibrary
LoadLibraryA
GetProcAddress
MultiByteToWideChar
GetLastError
WinExec
CreatePipe
GetStartupInfoA
CreateProcessA
CloseHandle
GetTickCount
ReadFile
TerminateProcess
ResumeThread
WaitForSingleObject
FormatMessageA
lstrlenA
LocalAlloc
LocalFree
GetStdHandle
InterlockedDecrement
user32
DestroyMenu
PostQuitMessage
PtInRect
GetClassNameA
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
GetDC
ReleaseDC
GetSysColorBrush
LoadCursorA
IsWindowEnabled
ShowWindow
SetWindowTextA
LoadIconA
PostMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
GetClientRect
wsprintfA
CharNextA
PostThreadMessageA
DispatchMessageA
GetMessageA
LoadStringA
EnableWindow
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
MessageBoxA
SetWindowsHookExA
GetCursorPos
PeekMessageA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
SendMessageA
GetActiveWindow
TranslateMessage
GetWindowTextA
GetNextDlgTabItem
GetParent
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
CopyRect
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
GetObjectA
GetDeviceCaps
DeleteDC
SaveDC
RestoreDC
SelectObject
DeleteObject
GetStockObject
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
GetTokenInformation
RegSetValueExA
RegCloseKey
RegQueryValueExA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
OpenSCManagerA
OpenServiceA
OpenThreadToken
OpenProcessToken
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
GetLengthSid
CopySid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExA
StartServiceCtrlDispatcherA
ControlService
DeleteService
CreateServiceA
CloseServiceHandle
RegDeleteValueA
comctl32
ord17
ole32
CoInitializeSecurity
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
OleRun
CoInitialize
CoUninitialize
oleaut32
SysFreeString
SysAllocStringByteLen
SysStringByteLen
VariantClear
VariantInit
SysAllocString
VariantChangeType
VariantCopy
LoadRegTypeLi
SysStringLen
SysAllocStringLen
GetErrorInfo
atl
ord23
ord20
ord17
ord18
ord57
ord16
ord32
ord58
ord30
Exports
Exports
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ