Static task
static1
Behavioral task
behavioral1
Sample
KG669.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
KG669.exe
Resource
win10v2004-20230703-en
General
-
Target
KG669.exe
-
Size
180KB
-
MD5
4984fd311929cb3eaf7e4b13a91aeb42
-
SHA1
9cc520fef6e3cb9c0752eefe13bd066e809e8f65
-
SHA256
21620918dc196e04631bc88e761fd7ff17add76156f3c57ca0bd2a55bd77f554
-
SHA512
73f878f2931b7731d449a2d6b9ff18eb1c19af7c43ad2ff975ec609421271c314d917c1dd4c39c09fad4755083efc0e09dd6d84b24c27f001c4ba81b02dd0d22
-
SSDEEP
3072:Eq4DWb339F8MdXsBGVIpw/nHMWL7Rez4YNTM:EWF8MCDpqHMm9eUYNT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource KG669.exe
Files
-
KG669.exe.exe windows x86
01cba9579a5d41e9db9324e384c27111
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5254
ord2445
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4427
ord327
ord401
ord674
ord642
ord4458
ord825
ord823
ord4078
ord5241
ord2385
ord5290
ord4441
ord2446
ord4424
ord3742
ord567
ord818
ord4275
ord1233
ord5261
ord755
ord537
ord470
ord800
ord665
ord1200
ord3790
ord5186
ord354
ord2379
ord1841
ord4589
ord4588
ord4899
ord4370
ord4892
ord4533
ord5076
ord4340
ord4347
ord4889
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord6054
ord5240
ord5281
ord3748
ord1725
ord5260
ord2091
ord4432
ord364
ord784
ord2302
ord4241
ord3996
ord6199
ord3495
ord4720
ord4508
ord535
ord6907
ord3302
ord5037
ord1175
ord3998
ord616
ord860
ord540
ord2370
ord2358
ord2298
ord2301
ord6334
ord2818
ord5856
ord2514
ord858
ord941
ord641
ord922
ord924
ord5953
ord3089
ord2411
ord2023
ord4218
ord2578
ord4398
ord3402
ord3582
ord795
ord2859
ord3721
ord5265
ord4376
ord4853
ord4998
ord6052
ord1775
ord5280
ord4425
ord3597
ord324
ord4234
ord4710
ord4809
ord6215
ord6905
ord6762
ord3797
ord5981
ord2080
ord3317
ord6880
ord6605
ord3301
ord3293
ord3092
ord3874
ord6453
ord6696
ord2860
ord4299
ord2864
ord3610
ord656
ord2089
ord6648
ord3910
ord2582
ord4402
ord3640
ord693
ord4243
ord5148
ord3370
ord1859
ord4246
ord4436
ord2127
ord2391
ord5102
ord5105
ord4468
ord3350
ord975
ord2880
ord4153
ord2383
ord5284
ord4437
ord4428
ord807
ord554
ord402
ord5871
ord2494
ord2627
ord2626
ord2117
ord6625
ord6242
ord4457
ord5255
ord3949
ord6197
ord1106
ord2884
ord1979
ord6385
ord2764
ord3499
ord2515
ord355
ord5442
ord2092
ord2243
ord2414
ord4129
ord4133
ord4297
ord5651
ord3127
ord3616
ord350
ord3126
ord3613
ord3663
ord3619
ord3626
ord6209
ord955
ord2763
ord4163
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord815
ord561
ord6117
ord2621
ord1134
ord2725
ord1168
ord5710
ord6154
ord2530
ord4364
ord4056
ord5471
ord4121
ord2389
ord5234
ord6369
ord5279
ord5248
ord2444
ord3583
ord6335
ord2123
ord4454
ord4000
ord3733
ord810
ord4271
ord3303
ord3914
ord3398
ord1842
ord5103
ord4151
ord5282
ord5252
ord366
ord4242
ord4499
ord1945
ord4341
ord4349
ord4723
ord4890
ord4964
ord4961
ord1726
ord560
ord813
ord4273
ord4613
ord4614
ord2535
ord1930
ord4265
ord2585
ord4365
ord5085
ord1709
ord1714
ord4404
ord5258
ord796
ord529
ord765
ord2108
ord3294
ord5039
ord3698
ord620
ord298
ord4230
ord2639
ord2997
ord3103
ord1146
ord4076
ord816
ord562
ord2380
ord2567
ord4023
ord2569
ord2714
ord3220
ord1140
ord4160
ord3072
ord1948
ord5303
ord4699
ord565
ord817
ord2726
ord4226
ord5715
ord4837
ord3798
ord1665
ord2649
ord5283
ord4353
ord6374
ord5163
ord2382
ord5237
ord4407
ord1776
ord4077
ord6055
ord4152
ord2878
ord2879
ord3403
ord5472
ord976
ord5012
ord3351
ord4303
ord4467
ord5104
ord5100
ord3059
ord2390
ord2723
ord2101
ord5101
ord4245
ord3869
ord1858
ord1576
msvcrt
_acmdln
exit
_XcptFilter
_exit
_onexit
__getmainargs
?terminate@@YAXXZ
_except_handler3
atof
_setmbcp
_itoa
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
__CxxFrameHandler
_ftol
strcpy
strcmp
sprintf
atoi
_mbscmp
memcpy
memset
_purecall
strcat
strlen
_controlfp
kernel32
SetCurrentDirectoryA
GetCurrentDirectoryA
lstrcpynA
ResumeThread
Sleep
GetSystemDefaultLCID
GetModuleHandleA
GetStartupInfoA
PurgeComm
ReadFile
WriteFile
CloseHandle
CreateFileA
GetCommState
SetupComm
SetCommState
GlobalUnlock
GlobalLock
FreeResource
SetCommTimeouts
GlobalAlloc
user32
SetWindowLongA
GetSysColorBrush
UpdateWindow
SetCursor
GetSysColor
FillRect
GetClassLongA
ReleaseCapture
CopyRect
SetRectEmpty
InflateRect
OffsetRect
DrawEdge
DrawFrameControl
ClientToScreen
ReleaseDC
GetDCEx
GetDlgItem
RedrawWindow
SetCapture
CheckMenuItem
ModifyMenuA
LoadMenuA
LoadAcceleratorsA
SetMenu
GetWindowRect
GetDlgCtrlID
LoadImageA
PtInRect
GetWindowLongA
GetParent
PostMessageA
LoadCursorA
GetClientRect
LockWindowUpdate
GetDC
GetKeyState
SetFocus
EndPaint
BeginPaint
SendMessageA
ShowScrollBar
EnableWindow
InvalidateRect
DestroyCursor
gdi32
SelectObject
GetStockObject
GetTextMetricsA
GetTextExtentPoint32A
Rectangle
GetDeviceCaps
PatBlt
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
ole32
CreateStreamOnHGlobal
olepro32
ord251
msvcirt
?close@ifstream@@QAEXXZ
??Bios@@QBEPAXXZ
?getline@istream@@QAEAAV1@PADHD@Z
?open@ifstream@@QAEXPBDHH@Z
?openprot@filebuf@@2HB
??0ifstream@@QAE@XZ
??_Difstream@@QAEXXZ
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ