Static task
static1
Behavioral task
behavioral1
Sample
23ca6860b74bc910a925b9de8ac9c1dc837ff8e20788e2423baed2af77e2ba8a.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
23ca6860b74bc910a925b9de8ac9c1dc837ff8e20788e2423baed2af77e2ba8a.exe
Resource
win10v2004-20230703-en
General
-
Target
23ca6860b74bc910a925b9de8ac9c1dc837ff8e20788e2423baed2af77e2ba8a
-
Size
550KB
-
MD5
0b58896489d4289a38b55cac52e148a0
-
SHA1
439c4e51bcfa2a82592e00d7649d68964976c935
-
SHA256
23ca6860b74bc910a925b9de8ac9c1dc837ff8e20788e2423baed2af77e2ba8a
-
SHA512
89e5a0f397a9ed5ae56d0152ef12f4d259ee1a059150a018c402321ce440c0a3f13a021724d4183cd9bd8d1c66b80b740b1c50e94e9126800daf3d321679682f
-
SSDEEP
6144:4kKqLoC8XcDHx1X1RZsK4veGnEQ3oL3k2hMHITl2iB4+0HEiqupLX/LFsPIUyIFy:4VpXSeK494L3kyqti2vxpT/LFjs8pUL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23ca6860b74bc910a925b9de8ac9c1dc837ff8e20788e2423baed2af77e2ba8a
Files
-
23ca6860b74bc910a925b9de8ac9c1dc837ff8e20788e2423baed2af77e2ba8a.exe windows x86
e3fecc312c6da264707773acd76af599
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetCPInfo
GetOEMCP
GetFileSizeEx
GetFileTime
SetErrorMode
GetTickCount
HeapFree
UnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapAlloc
RtlUnwind
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
SetStdHandle
GetFileType
HeapSize
IsValidCodePage
LCMapStringA
GetFileSize
SetHandleCount
GetStdHandle
GetConsoleCP
GetConsoleMode
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
InterlockedCompareExchange
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFlags
GetCurrentDirectoryA
GetThreadLocale
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
InterlockedIncrement
GetModuleHandleW
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetModuleFileNameW
GlobalAddAtomA
FreeResource
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
FreeLibrary
GetModuleHandleA
SetLastError
MulDiv
WritePrivateProfileStringA
SetFileAttributesA
RemoveDirectoryA
CopyFileA
CreateDirectoryA
WinExec
GetSystemDirectoryA
lstrcmpA
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
DeleteFileA
Sleep
GetLogicalDriveStringsA
GetPrivateProfileIntA
LocalAlloc
lstrlenA
LocalFree
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileA
GetProcAddress
LoadLibraryA
SetUnhandledExceptionFilter
FormatMessageA
GetLastError
MultiByteToWideChar
GetACP
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcpyA
CloseHandle
CreateProcessA
WaitForSingleObject
GetFileAttributesA
OutputDebugStringA
GetPrivateProfileStringA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
LCMapStringW
GetModuleFileNameA
CreateFileW
user32
PostThreadMessageA
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextA
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetLastActivePopup
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetWindow
SetWindowContextHelpId
GetParent
MapDialogRect
SetWindowPos
PostQuitMessage
GetMenuState
FindWindowA
MessageBeep
GetNextDlgGroupItem
GetMenuItemID
GetMenuItemCount
GetSubMenu
EnableWindow
ChangeDisplaySettingsA
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
PostMessageA
RegisterClipboardFormatA
SendMessageA
LoadIconA
DestroyMenu
UnregisterClassA
GetWindowThreadProcessId
CharUpperA
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
MapWindowPoints
GetTopWindow
GetMessageTime
UnhookWindowsHookEx
GetMessagePos
gdi32
SetMapMode
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathRemoveBackslashA
SHGetValueA
PathFileExistsA
PathRemoveFileSpecA
PathAddBackslashA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
SHSetValueA
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRevokeClassObject
OleInitialize
CoTaskMemFree
CoCreateInstance
CoInitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
oleaut32
SysStringLen
SysAllocStringByteLen
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysFreeString
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
wininet
InternetSetCookieA
Sections
.text Size: 374KB - Virtual size: 374KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ