Static task
static1
Behavioral task
behavioral1
Sample
707a109859c0ca49476ce2c6bc4b79d3b3e49ad28ea5ceb2ba51a976830ff909.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
707a109859c0ca49476ce2c6bc4b79d3b3e49ad28ea5ceb2ba51a976830ff909.exe
Resource
win10v2004-20230703-en
General
-
Target
707a109859c0ca49476ce2c6bc4b79d3b3e49ad28ea5ceb2ba51a976830ff909
-
Size
1.6MB
-
MD5
1d1dcfc9dec7fee60e8316bb935a8590
-
SHA1
42e464fa9cd7a6ff1fd7b4156e59b1badd737ed0
-
SHA256
707a109859c0ca49476ce2c6bc4b79d3b3e49ad28ea5ceb2ba51a976830ff909
-
SHA512
b9674395bf45f7797aa3a1c0f3642705da05c1c6eb67dad4eb0fa04ad1bb868bd1713e25d873be242998b66af3e37486a4bbabdf3263dd66a6e6977bce392a67
-
SSDEEP
49152:W8n6xTUGkMUK2f99sBMpguTxFez7YK2nC6V2KccYg2y:W8n6xTUGk3yB3uTzA7YK2ClTcYg/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 707a109859c0ca49476ce2c6bc4b79d3b3e49ad28ea5ceb2ba51a976830ff909
Files
-
707a109859c0ca49476ce2c6bc4b79d3b3e49ad28ea5ceb2ba51a976830ff909.exe windows x86
352e922b5c2e0ddcb0793ac4518fafc3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHGetFileInfoW
CommandLineToArgvW
ShellExecuteW
ShellExecuteExW
SHGetPathFromIDListW
SHGetMalloc
kernel32
CreateFileA
FreeLibrary
GetProcessHeap
HeapAlloc
GetLastError
GetProcAddress
HeapFree
LoadLibraryW
GetModuleFileNameW
LocalFree
WaitForSingleObject
CreateProcessW
SetCurrentDirectoryW
GetCurrentDirectoryW
CloseHandle
SetFileApisToOEM
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableW
SetThreadPriority
GetCurrentProcess
GetModuleHandleW
GetVersionExW
CreateFileW
ExpandEnvironmentStringsW
GetCommandLineW
RemoveDirectoryW
CreateDirectoryW
DeleteFileW
GetFileAttributesW
FindFirstFileW
FindClose
FindNextFileW
FormatMessageW
InterlockedExchangeAdd
SetFileTime
WriteFile
SetEndOfFile
GetFileSize
ReadFile
SetFilePointer
WideCharToMultiByte
GetACP
MultiByteToWideChar
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetLongPathNameW
MoveFileW
lstrlenW
GetTempPathW
GetFullPathNameW
GetWindowsDirectoryW
GetTempFileNameW
SetFileAttributesW
ResetEvent
CreateEventW
SetEvent
FindResourceW
FileTimeToSystemTime
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
WaitForMultipleObjects
ResumeThread
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetVersionExA
GetStartupInfoW
ExitThread
GetCurrentThreadId
CreateThread
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetOEMCP
IsValidCodePage
user32
CreateDialogParamW
SetTimer
LoadIconW
ScreenToClient
TranslateMessage
IsWindowVisible
GetMessageW
IsDialogMessageW
DestroyIcon
IsWindow
MessageBoxW
ShowWindow
PostMessageW
DialogBoxParamW
SetWindowPos
GetWindowRect
GetSystemMetrics
GetDlgItem
SendMessageW
EndDialog
SetFocus
GetWindowTextW
SetWindowTextW
PostQuitMessage
DispatchMessageW
GetActiveWindow
GetDesktopWindow
LoadStringW
KillTimer
EnableWindow
gdi32
CreateSolidBrush
DeleteObject
ole32
CoUninitialize
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CoInitialize
Sections
.text Size: 255KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ