Static task
static1
Behavioral task
behavioral1
Sample
081986df432918de08ce6a13f91973f23c1598034d9d7b817e16360d73220bc5.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
081986df432918de08ce6a13f91973f23c1598034d9d7b817e16360d73220bc5.exe
Resource
win10v2004-20230703-en
General
-
Target
081986df432918de08ce6a13f91973f23c1598034d9d7b817e16360d73220bc5
-
Size
578KB
-
MD5
0e9f0bb804bf442667f74035da890622
-
SHA1
3bc9d59ffe4e6ce6b584047508dc284db7fc5e5d
-
SHA256
081986df432918de08ce6a13f91973f23c1598034d9d7b817e16360d73220bc5
-
SHA512
555df36a004789a781fadde6960579dc9d337b2f04a47691c7d5b81ad4512a6295850319e26fd382bce3e554b1502172f00c8d74fd6ae738b8e404e58281a1cb
-
SSDEEP
6144:5IKkxyM2xrcZWMl5b0Z4mWZVtVusfQJlk7wg4or9MbZbDz+I/aKvKRZnhWeUfy:GKkucY/PI9RfQJlkkdor6bZniZKCqK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 081986df432918de08ce6a13f91973f23c1598034d9d7b817e16360d73220bc5
Files
-
081986df432918de08ce6a13f91973f23c1598034d9d7b817e16360d73220bc5.exe windows x86
0c8bb932e2ee720df8fb0c9d6a244ac8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
IIDFromString
StringFromGUID2
CLSIDFromString
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoTaskMemRealloc
CoUninitialize
CoCreateInstance
shell32
Shell_NotifyIconA
SHGetFolderPathW
ShellExecuteA
wininet
InternetTimeToSystemTime
InternetCrackUrlA
InternetTimeFromSystemTime
InternetCloseHandle
HttpQueryInfoA
InternetReadFile
HttpOpenRequestA
InternetErrorDlg
HttpSendRequestA
InternetOpenA
InternetConnectA
user32
GetDesktopWindow
CharNextA
wsprintfA
DispatchMessageW
RegisterClassA
LoadImageA
GetSystemMetrics
DispatchMessageA
PostMessageA
AppendMenuA
CreatePopupMenu
ShowWindow
MsgWaitForMultipleObjectsEx
GetCursorPos
DefWindowProcA
IsWindowUnicode
PeekMessageA
CreateWindowExA
GetWindowLongA
MessageBoxA
DestroyWindow
GetMessageA
GetMessageW
PostQuitMessage
TrackPopupMenu
SetForegroundWindow
LoadStringA
TranslateMessage
SetWindowLongA
version
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoSizeA
kernel32
RtlUnwind
HeapReAlloc
SetStdHandle
FindFirstFileExW
GetDriveTypeW
FileTimeToLocalFileTime
GetFullPathNameW
CreateDirectoryW
GetConsoleMode
GetConsoleCP
GetFileType
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualProtect
HeapAlloc
HeapFree
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedCompareExchange
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetTimeZoneInformation
FindResourceA
lstrcmpA
lstrlenA
GetModuleHandleExA
FreeLibrary
LoadResource
SystemTimeToTzSpecificLocalTime
InterlockedIncrement
InterlockedDecrement
WaitForSingleObject
GetCommandLineA
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
SizeofResource
CreateEventA
SetDllDirectoryA
IsDBCSLeadByte
lstrcatA
MultiByteToWideChar
lstrlenW
RaiseException
GetLastError
lstrcmpiA
GetProcAddress
WaitForMultipleObjects
HeapCreate
GetModuleHandleA
LoadLibraryExA
CreateMutexA
DeleteCriticalSection
CloseHandle
SetEvent
ResetEvent
CreateThread
lstrcpyA
lstrcpynA
CreateFileA
WriteFile
Sleep
ReadFile
OpenEventA
GetCurrentProcess
GetTickCount
GetVersionExA
GetCurrentProcessId
GetTempPathA
LocalFree
DeleteFileA
FileTimeToSystemTime
FormatMessageW
GetLocalTime
GetCurrentThreadId
PeekNamedPipe
SetHandleInformation
GetExitCodeProcess
CreateProcessA
TerminateProcess
CreatePipe
ExitProcess
GetLocaleInfoA
OpenProcess
GetSystemDirectoryA
FindClose
LoadLibraryA
LockResource
GetNativeSystemInfo
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
GetFileAttributesA
LoadLibraryExW
GetModuleHandleExW
LoadLibraryW
CreateFileW
SetFilePointerEx
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStdHandle
GetModuleFileNameW
HeapSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetLocaleInfoW
SetHandleCount
SetFilePointer
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetEndOfFile
GetProcessHeap
WriteConsoleW
GetCurrentDirectoryW
GetFileInformationByHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
CompareStringW
SetEnvironmentVariableA
GetModuleFileNameA
advapi32
CreateWellKnownSid
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetValueExA
ConvertSidToStringSidW
GetWindowsAccountDomainSid
CopySid
GetTokenInformation
OpenProcessToken
RegEnumKeyA
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
RegQueryValueExA
CryptGetHashParam
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegNotifyChangeKeyValue
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyW
oleaut32
VarUI4FromStr
gdi32
GetStockObject
crypt32
CryptStringToBinaryA
CryptUnprotectData
CryptProtectData
CryptBinaryToStringA
msi
ord189
ord91
ord117
ord141
ord168
ord67
ord160
ord158
ord115
ord159
ord8
ord44
ord31
ord204
ord137
Sections
.text Size: 348KB - Virtual size: 347KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ