Static task
static1
Behavioral task
behavioral1
Sample
d0b992b79d0ed790eaf077cad68bfc4b34e3bb49091977a1a77a01e865f7d862.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d0b992b79d0ed790eaf077cad68bfc4b34e3bb49091977a1a77a01e865f7d862.exe
Resource
win10v2004-20230703-en
General
-
Target
d0b992b79d0ed790eaf077cad68bfc4b34e3bb49091977a1a77a01e865f7d862
-
Size
12.9MB
-
MD5
ecf1ae7535a9f9e0716c0d08e4fe7c27
-
SHA1
cc059b365c002287b362015f179d5024f2a26b7c
-
SHA256
d0b992b79d0ed790eaf077cad68bfc4b34e3bb49091977a1a77a01e865f7d862
-
SHA512
c83f3b89c585828943f7bb5c55f3fcf352ff29d40b75ff4ee61a5c95fa03078bc62d209b568f6c588dc8af82db361ec7fa66d017793825d1421c7e8f9ccb76dd
-
SSDEEP
196608:G44512+UHJtz16Qy0GvJ4Z08RBCxXB7q3oWs/CFwXBDCL:AItzIQy0Z08RBCxXJq3olvXly
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0b992b79d0ed790eaf077cad68bfc4b34e3bb49091977a1a77a01e865f7d862
Files
-
d0b992b79d0ed790eaf077cad68bfc4b34e3bb49091977a1a77a01e865f7d862.exe windows x64
2d723a05c6dbcc6e7311bad6daab2705
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
comctl32
ImageList_EndDrag
ImageList_DragShowNolock
ImageList_DragEnter
ImageList_DragMove
ImageList_BeginDrag
ImageList_Create
ImageList_AddMasked
ord412
ord410
ord413
ImageList_Destroy
CreatePropertySheetPageW
ImageList_GetIconSize
ImageList_Draw
ord345
InitCommonControlsEx
kernel32
CreateMutexW
ReadFile
GetCurrentProcess
WriteFile
LocalAlloc
CreateFileW
GetFileAttributesW
GetModuleHandleA
GetCurrentThread
CloseHandle
GetProcAddress
LocalFree
GetFileSize
DebugBreak
IsDebuggerPresent
Sleep
QueryPerformanceFrequency
SystemTimeToFileTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
FindResourceW
GetModuleHandleW
GetLogicalDrives
MulDiv
VerSetConditionMask
VerifyVersionInfoW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapCreate
HeapFree
TerminateProcess
GetEnvironmentVariableA
WaitForSingleObject
LoadLibraryExA
WriteConsoleW
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
HeapSize
GetProcessHeap
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetConsoleOutputCP
ReadConsoleW
SetEnvironmentVariableW
GetModuleHandleExW
FreeLibraryAndExitThread
SetFilePointerEx
PeekNamedPipe
EncodePointer
LoadLibraryExW
TlsFree
RtlUnwind
RtlPcToFileHeader
RtlUnwindEx
InitializeCriticalSectionEx
GetStartupInfoW
InitializeSListHead
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetConsoleMode
CreateSemaphoreW
GetProcessAffinityMask
ReleaseSemaphore
MoveFileW
FlushFileBuffers
GetFileType
SetEndOfFile
CreateHardLinkW
RemoveDirectoryW
DeviceIoControl
SetThreadPriority
SetLastError
SetConsoleCtrlHandler
GetCurrentDirectoryW
FoldStringW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
TzSpecificLocalTimeToSystemTime
IsDBCSLeadByte
GetCPInfo
CompareStringW
AreFileApisANSI
LocalFileTimeToFileTime
FileTimeToDosDateTime
FileTimeToLocalFileTime
RaiseException
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualFree
VirtualProtect
GetSystemDirectoryW
OpenThread
VirtualQuery
GetThreadContext
ResumeThread
SuspendThread
Thread32First
Thread32Next
AllocConsole
FormatMessageA
FreeLibrary
CreateProcessW
SetCurrentDirectoryW
LoadLibraryW
AttachConsole
GetVersionExW
GetStdHandle
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
ReadDirectoryChangesW
QueueUserAPC
ResetEvent
ExitThread
WaitForMultipleObjectsEx
CompareFileTime
CancelIo
GetFileTime
OutputDebugStringA
GetTempPathW
GetUserDefaultUILanguage
MapViewOfFile
CreateFileMappingW
UnmapViewOfFile
SetErrorMode
GetFullPathNameW
GetCommandLineW
GetDateFormatW
GetTimeFormatW
CopyFileW
MoveFileExW
FormatMessageW
SetFileAttributesW
LoadResource
LockResource
SizeofResource
SetThreadExecutionState
GlobalAddAtomW
GlobalDeleteAtom
GetTickCount
GetSystemTime
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
Process32FirstW
Process32NextW
OpenProcess
ExitProcess
DeleteFileW
GetLastError
FindClose
FindNextFileW
FindFirstFileW
SetUnhandledExceptionFilter
Module32NextW
GlobalMemoryStatusEx
GetCurrentProcessId
HeapDestroy
Module32FirstW
GetExitCodeProcess
GetDriveTypeW
GetTempFileNameW
GetFileAttributesExW
GetFileInformationByHandle
GetVolumePathNameW
GetModuleFileNameW
SetFileTime
HeapAlloc
CreateThread
GetSystemInfo
HeapReAlloc
SetEvent
CreateEventW
CreateToolhelp32Snapshot
GetLocaleInfoA
GetDriveTypeA
GetPrivateProfileIntW
GetShortPathNameW
GetLongPathNameW
WritePrivateProfileStringW
GetFileSizeEx
SetNamedPipeHandleState
GetLocaleInfoW
WideCharToMultiByte
GetWindowsDirectoryW
lstrcpynW
GetFullPathNameA
GetModuleFileNameA
CreateEventA
GetCurrentThreadId
GetACP
MultiByteToWideChar
CreateDirectoryW
GetEnvironmentVariableW
ReleaseMutex
SetFilePointer
TlsSetValue
TlsAlloc
TlsGetValue
user32
PostMessageW
SendMessageW
CreateAcceleratorTableW
DestroyAcceleratorTable
GetSysColor
SystemParametersInfoW
EndPaint
RegisterWindowMessageW
WindowFromDC
IsWindowEnabled
GetClassInfoExW
GetMessagePos
SetRectEmpty
ClientToScreen
SetLayeredWindowAttributes
DeferWindowPos
GetPropW
RemovePropW
BeginDeferWindowPos
SetPropW
EndDeferWindowPos
CharLowerW
IsChild
HideCaret
SetClassLongPtrW
ShowCaret
IsCharAlphaNumericW
ValidateRect
GetUpdateRect
GetWindowThreadProcessId
GetMessageW
AllowSetForegroundWindow
FindWindowExW
LoadBitmapW
TranslateAcceleratorW
GetClassNameW
SetParent
MapVirtualKeyW
ScreenToClient
IsWindow
MessageBoxA
CharLowerBuffW
GetAncestor
IsCharUpperW
GetWindowLongW
GetWindow
CheckRadioButton
EndDialog
SetDlgItemTextW
SendDlgItemMessageW
DialogBoxIndirectParamW
IsDlgButtonChecked
SetWindowLongW
CheckDlgButton
DialogBoxParamW
MoveWindow
GetFocus
OpenClipboard
CloseClipboard
EmptyClipboard
GetWindowTextLengthW
ReuseDDElParam
ShowWindowAsync
IsWindowUnicode
UnpackDDElParam
LoadCursorW
DrawTextW
ModifyMenuW
CheckMenuRadioItem
GetMenuItemID
GetMenu
SetMenuItemInfoW
SetMenu
DrawTextExW
InsertMenuW
MessageBeep
GetDesktopWindow
UpdateWindow
MsgWaitForMultipleObjects
DispatchMessageW
IsDialogMessageW
PeekMessageW
TranslateMessage
GetDlgItem
PostQuitMessage
EnableWindow
MessageBoxW
CreateMenu
BringWindowToTop
LoadIconW
SetActiveWindow
DestroyWindow
GetMenuItemInfoW
GetSystemMenu
CallWindowProcW
GetWindowRect
IsWindowVisible
SetWindowPos
GetMenuItemCount
SetWindowLongPtrW
CreateWindowExW
CreatePopupMenu
GetWindowLongPtrW
RegisterClassExW
GetClassLongPtrW
TrackPopupMenu
ShowWindow
InvalidateRgn
OffsetRect
RedrawWindow
MapWindowPoints
SetMenuDefaultItem
SendInput
GetCursorPos
SetForegroundWindow
DdeFreeStringHandle
DdeDisconnect
CheckMenuItem
SetClipboardData
DdeFreeDataHandle
DdeClientTransaction
DdeUninitialize
DdeInitializeW
TrackMouseEvent
GetMonitorInfoW
GetWindowInfo
DdeConnect
DdeCreateStringHandleW
wsprintfA
DestroyCursor
EnumDisplayMonitors
MonitorFromWindow
MonitorFromRect
CopyImage
GetKeyState
AdjustWindowRectEx
OemToCharA
CharToOemA
OemToCharBuffA
CharUpperW
CharToOemBuffW
GetForegroundWindow
DestroyMenu
FindWindowW
GetWindowDC
TrackPopupMenuEx
RemoveMenu
GetClientRect
BeginPaint
IsZoomed
AppendMenuW
DrawIconEx
EnableMenuItem
DrawEdge
GetParent
DrawFrameControl
InvalidateRect
SetScrollInfo
DefWindowProcW
ShowScrollBar
GetDC
FillRect
GetCursor
GetScrollInfo
GetScrollPos
GetCapture
SetTimer
SetFocus
SetCapture
SetCursor
KillTimer
ReleaseCapture
IsIconic
ReleaseDC
GetSystemMetrics
gdi32
CreateCompatibleBitmap
GetDIBits
SetGraphicsMode
SetStretchBltMode
GetDIBColorTable
SetDIBColorTable
SetDIBits
SetROP2
ExtTextOutW
CreatePatternBrush
CreateBitmap
GetObjectW
GetObjectA
IntersectClipRect
SetWorldTransform
CreateDIBSection
SetLayout
CreateRoundRectRgn
TextOutW
GetTextExtentPoint32W
SelectClipRgn
RoundRect
BitBlt
StartPage
AbortDoc
EndDoc
CreateDCW
SetMapMode
StartDocW
EndPage
GetDeviceCaps
LineTo
MoveToEx
SetBkColor
CreateFontIndirectW
SetBkMode
GetClipBox
CreateRectRgn
SetViewportOrgEx
ExcludeClipRect
ExtSelectClipRgn
SetBrushOrgEx
SelectObject
CreateCompatibleDC
PatBlt
StretchBlt
GetStockObject
DeleteDC
SetTextColor
CreatePen
Rectangle
DeleteObject
CreateSolidBrush
winspool.drv
EnumPrintersW
DeviceCapabilitiesW
ClosePrinter
DocumentPropertiesW
GetPrinterW
OpenPrinterW
ord203
comdlg32
GetOpenFileNameW
PrintDlgExW
GetSaveFileNameW
advapi32
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyW
RegQueryValueExW
InitializeSecurityDescriptor
CheckTokenMembership
FreeSid
OpenProcessToken
RegSetKeySecurity
RegOpenKeyExW
SetFileSecurityW
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
SetSecurityDescriptorDacl
AllocateAndInitializeSid
shell32
SHFileOperationW
SHAddToRecentDocs
DragAcceptFiles
SHGetFolderPathW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
SHGetMalloc
DragFinish
DragQueryFileW
CommandLineToArgvW
SHGetDesktopFolder
ShellExecuteExW
SHBindToParent
SHChangeNotify
ole32
CoCreateInstance
CreateStreamOnHGlobal
CoUninitialize
CoTaskMemFree
ReleaseStgMedium
CoGetMalloc
OleUninitialize
OleInitialize
CoTaskMemAlloc
CoInitialize
oleaut32
VariantClear
SysFreeString
SysAllocString
SafeArrayPutElement
SafeArrayCreateVector
VariantInit
Sections
.text Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data: Size: 5.6MB - Virtual size: 5.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 126KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 908KB - Virtual size: 907KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ