Static task
static1
Behavioral task
behavioral1
Sample
bd57083a7457cb561db8cee7a48e6b3aba74fca2deae4708ef91a6cfaa594695.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
bd57083a7457cb561db8cee7a48e6b3aba74fca2deae4708ef91a6cfaa594695.exe
Resource
win10v2004-20230703-en
General
-
Target
bd57083a7457cb561db8cee7a48e6b3aba74fca2deae4708ef91a6cfaa594695
-
Size
196KB
-
MD5
785433a0765097a9660f5470e044a015
-
SHA1
368ccde02cb4332c3bb2bf97fc7a8ef2685845ef
-
SHA256
bd57083a7457cb561db8cee7a48e6b3aba74fca2deae4708ef91a6cfaa594695
-
SHA512
7ecbfa1c9c514928226890850e90aaf318228fbd7b30ae20e124f0572c35439545d76e466c655bcc53095d66eb325ca05d4e07d9a939a444f3d7cfb16a467bb3
-
SSDEEP
3072:dnGJ1cthoW5rrF/sPRkAaRsF7hTeSvnLNo3Q/vLtEzYdgz8s/y:AIthl5HF/srNNoQ/uYB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd57083a7457cb561db8cee7a48e6b3aba74fca2deae4708ef91a6cfaa594695
Files
-
bd57083a7457cb561db8cee7a48e6b3aba74fca2deae4708ef91a6cfaa594695.exe windows x86
9e98c7dc06bfc2bb94fd3687841953f2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
WritePrivateProfileStringW
SetErrorMode
WriteFile
SetFilePointer
FlushFileBuffers
GetStartupInfoW
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
HeapAlloc
HeapFree
HeapReAlloc
LeaveCriticalSection
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetEnvironmentStrings
GetCommandLineA
SetHandleCount
GetStdHandle
GetFileType
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
IsBadCodePtr
GetCPInfo
GetStringTypeA
GetStringTypeW
SetStdHandle
GetACP
GetOEMCP
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
FindResourceA
GlobalAddAtomA
GetProfileStringA
InitializeCriticalSection
LocalAlloc
SizeofResource
GetLastError
GlobalFlags
lstrcmpiW
lstrcmpW
lstrcmpA
lstrcmpiA
GetCurrentThread
LocalFree
lstrcpynW
MulDiv
SetLastError
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
LoadLibraryA
lstrlenA
MultiByteToWideChar
GetVersion
lstrcatW
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
lstrcpyW
GetProcAddress
GlobalFree
LockResource
FindResourceW
LoadResource
GetLocalTime
FindNextFileA
GetStartupInfoA
CreatePipe
GetModuleHandleW
GetEnvironmentVariableW
VirtualProtect
GetProcessTimes
FindFirstFileA
ExitProcess
GetCommandLineW
GetTickCount
GetSystemDirectoryW
MoveFileExW
GetTempPathW
CreateDirectoryW
CopyFileW
GetCurrentProcess
FindFirstFileW
FindNextFileW
ReadFile
GlobalUnlock
OpenProcess
VirtualAlloc
ReadProcessMemory
VirtualFree
TerminateProcess
GetModuleFileNameW
SetFileAttributesW
DeleteFileW
OpenMutexW
OpenEventW
CreateMutexW
CreateEventW
IsBadReadPtr
IsBadWritePtr
GetCurrentThreadId
UnmapViewOfFile
CloseHandle
FlushViewOfFile
OpenFileMappingW
MapViewOfFile
CreateFileW
GetFileSize
lstrlenW
WideCharToMultiByte
WinExec
GetWindowsDirectoryW
LoadLibraryW
FreeLibrary
Sleep
GlobalAlloc
GlobalLock
HeapSize
user32
UpdateWindow
IsDialogMessageW
SetWindowTextW
MoveWindow
ShowWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuW
GetMenuState
LoadBitmapW
GetMenuCheckMarkDimensions
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutW
DrawTextW
GrayStringW
WindowFromPoint
GetCursorPos
LoadStringW
DestroyMenu
PostQuitMessage
ValidateRect
TranslateMessage
GetClassNameW
GetSysColorBrush
CopyRect
IsWindowVisible
GetTopWindow
MessageBoxW
GetCapture
WinHelpW
GetClassInfoW
RegisterClassW
GetMenu
GetMenuItemCount
GetMenuItemID
SendDlgItemMessageW
AdjustWindowRectEx
GetWindowTextLengthW
GetDlgCtrlID
GetKeyState
CreateWindowExW
SetWindowsHookExW
CallNextHookEx
SetPropW
UnhookWindowsHookEx
GetPropW
CallWindowProcW
RemovePropW
DefWindowProcW
GetMessageTime
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoW
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetWindowTextW
IsDialogMessageA
CreateDialogParamW
GetWindowPlacement
RegisterClassA
ToUnicodeEx
GetWindowLongA
IsIconic
DrawIcon
GetSystemMenu
AppendMenuW
LoadIconW
GetInputState
PostThreadMessageW
GetMessageW
PostMessageW
FindWindowW
wsprintfW
LoadMenuW
GetSubMenu
GetSystemMetrics
DrawFocusRect
LoadCursorW
CopyIcon
EnableWindow
CloseClipboard
OpenClipboard
UnregisterClassW
GetWindowTextLengthA
GetWindowRect
GetParent
GetDC
ReleaseDC
InflateRect
RedrawWindow
IsWindow
GetSysColor
SetCursor
GetMessagePos
ScreenToClient
PtInRect
InvalidateRect
SetTimer
MessageBeep
SetWindowLongW
GetClientRect
SendMessageW
SendDlgItemMessageA
MapWindowPoints
PeekMessageW
DispatchMessageW
GetFocus
TrackPopupMenu
SetFocus
KillTimer
DestroyCursor
RegisterWindowMessageW
EmptyClipboard
SetClipboardData
GetPropA
SetPropA
SetWindowLongA
GetClassNameA
IsWindowUnicode
SendMessageA
SetWindowsHookExA
RemovePropA
CallWindowProcA
CharNextA
DefWindowProcA
DefDlgProcA
GetClassInfoA
DrawTextA
GetWindowTextA
ExcludeUpdateRgn
ShowCaret
HideCaret
GetWindow
gdi32
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutW
Escape
PatBlt
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
SetBkColor
GetClipBox
ExcludeClipRect
SetTextColor
ExtTextOutW
GetTextMetricsW
GetCharWidthW
GetTextExtentPoint32W
CreateSolidBrush
GetStockObject
GetObjectW
CreateDIBitmap
ExtTextOutA
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateFontIndirectW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
OpenProcessToken
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegDeleteValueW
RegCloseKey
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
comctl32
ord17
psapi
GetModuleFileNameExW
EnumProcesses
Sections
.text Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ