Static task
static1
Behavioral task
behavioral1
Sample
612e16f332b100def5afeca60f055d7b5624d3f68c2abf1462bfb828a93e3542.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
612e16f332b100def5afeca60f055d7b5624d3f68c2abf1462bfb828a93e3542.exe
Resource
win10v2004-20230703-en
General
-
Target
612e16f332b100def5afeca60f055d7b5624d3f68c2abf1462bfb828a93e3542
-
Size
212KB
-
MD5
02c6ef834e89545e593ad9f3031aad96
-
SHA1
5f7f59b30df5a438d0d6263aeed4410c5afd7ee0
-
SHA256
612e16f332b100def5afeca60f055d7b5624d3f68c2abf1462bfb828a93e3542
-
SHA512
08ba89680a3f7ef88067279094c4c44cf88942136e5fc12e7bb5806dc2a9988b7bf4ea758d4717277473d867e21e5eeafc26db534d8467f8e0d33f4ff6d7075f
-
SSDEEP
3072:Xk/Yj+t/tOi/FpczU0I1mUEQVqYF9sUtXLt03ZN7gzUsV6:Xk/Yj+60FmzU0I1TDt2ZNt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 612e16f332b100def5afeca60f055d7b5624d3f68c2abf1462bfb828a93e3542
Files
-
612e16f332b100def5afeca60f055d7b5624d3f68c2abf1462bfb828a93e3542.exe windows x86
fdaff1aece84f4e907cc8c01fe79f117
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
WritePrivateProfileStringW
SetErrorMode
WriteFile
SetFilePointer
FlushFileBuffers
GetStartupInfoW
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
HeapAlloc
HeapFree
HeapReAlloc
LeaveCriticalSection
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetEnvironmentStrings
GetCommandLineA
SetHandleCount
GetStdHandle
GetFileType
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
IsBadCodePtr
GetCPInfo
GetStringTypeA
GetStringTypeW
SetStdHandle
GetACP
GetOEMCP
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
FindResourceA
GlobalAddAtomA
GetProfileStringA
InitializeCriticalSection
LocalAlloc
SizeofResource
GetLastError
GlobalFlags
lstrcmpiW
lstrcmpW
lstrcmpA
lstrcmpiA
GetCurrentThread
LocalFree
lstrcpynW
MulDiv
SetLastError
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
LoadLibraryA
lstrlenA
MultiByteToWideChar
GetVersion
lstrcatW
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
lstrcpyW
GetProcAddress
GlobalFree
LockResource
FindResourceW
LoadResource
GetLocalTime
FindNextFileA
GetStartupInfoA
CreatePipe
GetModuleHandleW
GetEnvironmentVariableW
VirtualProtect
GetProcessTimes
FindFirstFileA
ExitProcess
GetCommandLineW
GetTickCount
GetSystemDirectoryW
MoveFileExW
GetTempPathW
CreateDirectoryW
CopyFileW
GetCurrentProcess
FindFirstFileW
FindNextFileW
ReadFile
CreateToolhelp32Snapshot
GlobalUnlock
Process32FirstW
Process32NextW
OpenProcess
VirtualAlloc
ReadProcessMemory
TerminateProcess
VirtualFree
GetModuleFileNameW
SetFileAttributesW
DeleteFileW
OpenMutexW
OpenEventW
CreateMutexW
CreateEventW
ReleaseMutex
WaitForSingleObject
IsBadReadPtr
IsBadWritePtr
SetEvent
GetCurrentThreadId
UnmapViewOfFile
CloseHandle
FlushViewOfFile
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
CreateFileW
DeviceIoControl
GetFileSize
WideCharToMultiByte
lstrlenW
WinExec
GetWindowsDirectoryW
LoadLibraryW
FreeLibrary
Sleep
GlobalAlloc
GlobalSize
GlobalLock
HeapSize
user32
UpdateWindow
IsDialogMessageW
SetWindowTextW
MoveWindow
ShowWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuW
GetMenuState
LoadBitmapW
GetMenuCheckMarkDimensions
WindowFromPoint
GetCursorPos
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutW
DrawTextW
GrayStringW
LoadStringW
DestroyMenu
PostQuitMessage
ValidateRect
TranslateMessage
GetClassNameW
GetSysColorBrush
CopyRect
IsWindowVisible
GetTopWindow
MessageBoxW
GetCapture
WinHelpW
GetClassInfoW
RegisterClassW
GetMenu
GetMenuItemCount
GetMenuItemID
SendDlgItemMessageW
AdjustWindowRectEx
GetWindowTextLengthW
GetDlgCtrlID
GetKeyState
CreateWindowExW
SetWindowsHookExW
CallNextHookEx
SetPropW
UnhookWindowsHookEx
GetPropW
CallWindowProcW
RemovePropW
DefWindowProcW
GetMessageTime
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoW
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
LoadIconW
IsIconic
GetSystemMenu
AppendMenuW
DrawIcon
GetWindowTextW
IsDialogMessageA
CreateDialogParamW
GetWindowPlacement
RegisterClassA
ToUnicodeEx
GetWindowLongA
GetInputState
PostThreadMessageW
GetMessageW
FindWindowW
PostMessageW
wsprintfW
LoadMenuW
GetSubMenu
DrawFocusRect
GetSystemMetrics
GetParent
KillTimer
EnableWindow
CloseClipboard
GetClipboardData
OpenClipboard
UnregisterClassW
GetWindowTextLengthA
SetTimer
RedrawWindow
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
GetClientRect
GetWindowRect
SendMessageW
InflateRect
PtInRect
LoadCursorW
CopyIcon
IsWindow
GetSysColor
SetCursor
GetMessagePos
MessageBeep
SendDlgItemMessageA
MapWindowPoints
PeekMessageW
DispatchMessageW
GetFocus
TrackPopupMenu
SetFocus
SetWindowLongW
DestroyCursor
RegisterWindowMessageW
EmptyClipboard
SetClipboardData
GetPropA
SetPropA
SetWindowLongA
GetClassNameA
IsWindowUnicode
SendMessageA
SetWindowsHookExA
RemovePropA
CallWindowProcA
CharNextA
DefWindowProcA
DefDlgProcA
GetClassInfoA
DrawTextA
GetWindowTextA
ExcludeUpdateRgn
ShowCaret
HideCaret
GetWindow
gdi32
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutW
Escape
PatBlt
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
SetBkColor
GetClipBox
ExcludeClipRect
SetTextColor
ExtTextOutW
GetCharWidthW
GetTextMetricsW
GetTextExtentPoint32W
GetObjectW
CreateFontIndirectW
CreateSolidBrush
CreateDIBitmap
ExtTextOutA
GetTextExtentPointA
BitBlt
CreateCompatibleDC
GetStockObject
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
OpenProcessToken
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegDeleteValueW
RegCloseKey
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
comctl32
ord17
psapi
GetModuleFileNameExW
EnumProcesses
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ