Static task
static1
Behavioral task
behavioral1
Sample
b49d3e7021890b1e808d4ba7f0ca39dd3e948e0b49e25c93e7bc64cf02d2460b.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
b49d3e7021890b1e808d4ba7f0ca39dd3e948e0b49e25c93e7bc64cf02d2460b.exe
Resource
win10v2004-20230703-en
General
-
Target
b49d3e7021890b1e808d4ba7f0ca39dd3e948e0b49e25c93e7bc64cf02d2460b
-
Size
627KB
-
MD5
9a87499520248b9195aa1bccf77eea61
-
SHA1
b9930e6baf3f11fba0ea634c346ba215a6494f97
-
SHA256
b49d3e7021890b1e808d4ba7f0ca39dd3e948e0b49e25c93e7bc64cf02d2460b
-
SHA512
8e6c0e7889aebeb1348980b0cbab070358690501d0ac973d0c31f69bc9efec6b0250fea9f1a08c0931b8e4d3373f310e2c4876f80ca2089a4d32b18e0fa6c982
-
SSDEEP
12288:rigExcC/Z/54+d1x5Z9vkuA0leIIhFTxNQQQQQQl:rigEiaj4U1nZ9c44
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b49d3e7021890b1e808d4ba7f0ca39dd3e948e0b49e25c93e7bc64cf02d2460b
Files
-
b49d3e7021890b1e808d4ba7f0ca39dd3e948e0b49e25c93e7bc64cf02d2460b.exe windows x86
d5771fe0d1369d420e0d861977aaa911
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetUnhandledExceptionFilter
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleA
SetEnvironmentVariableA
SearchPathA
GetLocalTime
GetFileInformationByHandle
GetFileType
GetEnvironmentVariableA
GetUserDefaultLangID
MultiByteToWideChar
CompareFileTime
GlobalAlloc
GlobalLock
GlobalUnlock
GetStartupInfoA
FindResourceA
LoadResource
LockResource
SizeofResource
GetWindowsDirectoryA
GetTempPathA
SetFileAttributesA
FileTimeToSystemTime
GetDateFormatA
GetTimeFormatA
GetFileSize
CreateFileMappingA
MapViewOfFile
GetShortPathNameA
FormatMessageA
LocalFree
ExitProcess
GetComputerNameA
GetSystemInfo
GlobalMemoryStatus
GetTimeZoneInformation
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
GetSystemDefaultLangID
GetVersionExA
GetCurrentProcess
UnmapViewOfFile
WriteProcessMemory
FlushInstructionCache
ReadProcessMemory
VirtualQueryEx
VirtualProtectEx
WriteFile
ReadFile
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDrives
GetDriveTypeA
SetFilePointer
ExpandEnvironmentStringsA
GetSystemDirectoryA
GetFileAttributesA
GetFullPathNameA
CreateFileA
FreeLibrary
GetCommandLineA
GetLocaleInfoA
CreateEventA
WaitForSingleObject
CreateProcessA
SetEvent
WaitForDebugEvent
ContinueDebugEvent
DeleteCriticalSection
GetCurrentThreadId
TerminateThread
TerminateProcess
GetModuleFileNameA
CloseHandle
GetThreadContext
LoadLibraryW
LoadLibraryExA
LoadLibraryExW
InterlockedExchange
LCMapStringW
LCMapStringA
VirtualQuery
VirtualAlloc
VirtualProtect
Sleep
VirtualFree
HeapCreate
HeapDestroy
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetACP
HeapSize
HeapReAlloc
CreateThread
ExitThread
RtlUnwind
GetProcessHeap
HeapAlloc
HeapFree
GetProfileStringA
SetErrorMode
SystemTimeToFileTime
LocalFileTimeToFileTime
GetThreadLocale
GetStringTypeExA
GetVolumeInformationA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
IsBadWritePtr
GlobalHandle
TlsAlloc
LocalAlloc
GlobalFlags
GetProcessVersion
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetTempFileNameA
GlobalFree
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcmpA
GetCurrentThread
SuspendThread
SetThreadPriority
MulDiv
lstrcmpiA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcpynA
GlobalGetAtomNameA
GlobalAddAtomA
GetVersion
lstrcpyA
lstrlenA
ResumeThread
LoadLibraryA
GetProcAddress
SetThreadContext
GetLastError
SetLastError
RaiseException
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTickCount
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueExA
GetUserNameA
RegEnumKeyExA
RegEnumValueA
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegSetValueA
gdi32
GetTextMetricsA
CreateRectRgnIndirect
PatBlt
Escape
TextOutA
RectVisible
PtVisible
CreatePatternBrush
CreateSolidBrush
GetDeviceCaps
CreateRectRgn
StretchDIBits
IntersectClipRect
ExcludeClipRect
SelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetClipBox
GetTextAlign
GetTextExtentPoint32A
SetTextAlign
SetBkColor
SetTextColor
ExtTextOutA
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontA
SetRectRgn
CombineRgn
BitBlt
CreateDIBitmap
GetStockObject
GetTextExtentPointA
SelectObject
DeleteObject
GetCharWidthA
CreateFontIndirectA
GetObjectA
LineTo
MoveToEx
user32
GetDlgItemTextA
SetDlgItemTextA
IsDlgButtonChecked
IsDialogMessageA
MoveWindow
GetNextDlgTabItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
InflateRect
SetCapture
SetCursorPos
DestroyCursor
LoadCursorA
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
PostQuitMessage
CreateDialogIndirectParamA
EndDialog
ShowOwnedPopups
WaitMessage
GetWindowThreadProcessId
WindowFromPoint
SetParent
IsRectEmpty
AppendMenuA
DeleteMenu
GetSystemMenu
CheckDlgButton
GetClassNameA
LoadStringA
FindWindowA
FillRect
InsertMenuA
GetMenuStringA
DestroyIcon
SetRect
CharUpperA
InvertRect
GetDCEx
LockWindowUpdate
IsWindowUnicode
CharNextA
DefDlgProcA
ExcludeUpdateRgn
ShowCaret
HideCaret
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
RegisterClassA
TrackPopupMenu
DefWindowProcA
DestroyWindow
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetForegroundWindow
SetForegroundWindow
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetLastActivePopup
SendDlgItemMessageA
MapWindowPoints
DispatchMessageA
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
GetSysColorBrush
IsWindowVisible
EqualRect
GetKeyState
GetDlgCtrlID
UnpackDDElParam
ReuseDDElParam
SetMenu
LoadIconA
GetClassInfoA
DestroyMenu
ShowWindow
GetWindow
SetCursor
PeekMessageA
GetCapture
ReleaseCapture
LoadAcceleratorsA
SetRectEmpty
GetActiveWindow
wsprintfA
GetMenuItemID
AdjustWindowRectEx
RedrawWindow
SetWindowPos
GetWindowLongA
SetWindowLongA
DefMDIChildProcA
DrawMenuBar
TranslateAcceleratorA
TranslateMDISysAccel
DefFrameProcA
BringWindowToTop
GetMenu
GetMenuItemCount
RegisterWindowMessageA
SetActiveWindow
ClientToScreen
OffsetRect
PtInRect
GetDesktopWindow
EmptyClipboard
SetClipboardData
CloseClipboard
GetMessagePos
OpenClipboard
IsIconic
LoadMenuA
GetSubMenu
GetMessageTime
GetSysColor
DrawFocusRect
CopyRect
GetDC
ReleaseDC
MessageBeep
GetParent
GetClientRect
GetSystemMetrics
KillTimer
SetTimer
InvalidateRect
ScreenToClient
GetWindowRect
IsZoomed
RemoveMenu
EnableMenuItem
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetFocus
IsWindowEnabled
IsWindow
SetFocus
MessageBoxA
WinHelpA
EnableWindow
UpdateWindow
SetDebugErrorLevel
PostMessageA
SendMessageA
CreateWindowExA
UnregisterClassA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
FindTextA
GetOpenFileNameA
CommDlgExtendedError
GetFileTitleA
GetSaveFileNameA
ReplaceTextA
comctl32
ImageList_LoadImageA
ImageList_Destroy
ord17
ImageList_Draw
shell32
ExtractIconA
DragAcceptFiles
DragQueryFileA
DragFinish
SHBrowseForFolderA
ShellExecuteExA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHGetFileInfoA
Sections
.text Size: 407KB - Virtual size: 407KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ