Static task
static1
Behavioral task
behavioral1
Sample
b9537c9bc12072af4282b5b20510b4ea334ca63a3909dd458f73a53f88efee5c.exe
Resource
win7-20230703-en
General
-
Target
b9537c9bc12072af4282b5b20510b4ea334ca63a3909dd458f73a53f88efee5c
-
Size
1.5MB
-
MD5
2283ece36ce5fb9559f3b70d8eb1a466
-
SHA1
23c30a06ed00ebd87e759c77706effb7d91d462e
-
SHA256
b9537c9bc12072af4282b5b20510b4ea334ca63a3909dd458f73a53f88efee5c
-
SHA512
0e88393833a3e91127706ce3ada6b56442ec6946313b11f7d0870f9853540e6fa7c9c2321ab38f757caf803eb8103b48b70f78466ec012c8caa30f00d7a8835d
-
SSDEEP
24576:IXuJ9fORMnqxZi8QAHpxwawcoG+kPRBntcOp/C7xXynzXf/4tJ5:euJ9yCezhIaw+tcOp/mXkrAtj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9537c9bc12072af4282b5b20510b4ea334ca63a3909dd458f73a53f88efee5c
Files
-
b9537c9bc12072af4282b5b20510b4ea334ca63a3909dd458f73a53f88efee5c.exe windows x86
62f26eba9fccb82c0c1354f9d401ce6c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetFileTime
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapReAlloc
HeapAlloc
VirtualAlloc
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
ExitProcess
ExitThread
CreateThread
SetStdHandle
GetFileType
HeapSize
GetACP
IsValidCodePage
GetTimeZoneInformation
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTickCount
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
SetConsoleCtrlHandler
GetDriveTypeA
GetStringTypeA
GetStringTypeW
SetErrorMode
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
WideCharToMultiByte
SizeofResource
LockResource
LoadResource
FindResourceA
GetTempPathA
CreateFileA
WriteFile
GetModuleFileNameA
CloseHandle
LoadLibraryA
GetProcAddress
Sleep
CompareStringA
InterlockedExchange
GetVersion
CompareStringW
lstrlenA
MultiByteToWideChar
GetLastError
LocalFree
Process32Next
Process32First
GetCurrentProcessId
FormatMessageA
InterlockedIncrement
GetCurrentThreadId
WaitForSingleObject
OpenProcess
InterlockedDecrement
TerminateProcess
CreateToolhelp32Snapshot
GlobalMemoryStatus
FlushConsoleInputBuffer
ReadConsoleInputA
SetConsoleMode
CreateFileW
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
GetCurrentDirectoryA
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetModuleFileNameW
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
FindFirstFileA
GetVersionExA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
MulDiv
WritePrivateProfileStringA
GlobalUnlock
GlobalFree
FreeResource
SetLastError
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetModuleHandleA
GlobalAddAtomA
GetProcessHeap
HeapFree
FindClose
FindNextFileA
user32
UnregisterClassA
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
SetWindowTextA
IsDialogMessageA
DestroyMenu
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetProcessWindowStation
GetUserObjectInformationW
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetMenuItemID
GetWindowTextA
GetMenuItemCount
GetSubMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
GetMenuState
CheckMenuItem
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
PostMessageA
PostQuitMessage
SetCursor
CharUpperA
ClientToScreen
GetCursorPos
LoadIconA
DrawIcon
SendMessageA
FindWindowExA
FindWindowA
GetClientRect
GetSystemMetrics
EnableWindow
IsIconic
IsWindowVisible
EnableMenuItem
GetDesktopWindow
GetSystemMenu
gdi32
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RestoreDC
SaveDC
ExtTextOutA
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegDeleteKeyA
ReportEventA
DeregisterEventSource
RegOpenKeyExA
RegQueryValueExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegisterEventSourceA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
shell32
Shell_NotifyIconA
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
oleaut32
VariantClear
VariantChangeType
VariantInit
ws2_32
bind
htons
setsockopt
closesocket
WSAStartup
inet_addr
listen
socket
accept
shutdown
WSAGetLastError
recv
WSASetLastError
send
Sections
.text Size: 848KB - Virtual size: 844KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 344KB - Virtual size: 340KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ