Static task
static1
Behavioral task
behavioral1
Sample
759bc38db75e7356df258d6c5ec65d2008088110d18800e4cc705835d1e39abb.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
759bc38db75e7356df258d6c5ec65d2008088110d18800e4cc705835d1e39abb.exe
Resource
win10v2004-20230703-en
General
-
Target
759bc38db75e7356df258d6c5ec65d2008088110d18800e4cc705835d1e39abb
-
Size
595KB
-
MD5
551c3f8771cb94110e7a53f720315d4a
-
SHA1
4613c234ae6ea07fe9372db101040adf6c2db82c
-
SHA256
759bc38db75e7356df258d6c5ec65d2008088110d18800e4cc705835d1e39abb
-
SHA512
68d10ac4d43a98499e18dd29303faafd5fadcefff0244ec26579edbc8d2747d4cdba3f572156da8f79100dbf9435c55b5182c6099190a64f07f51260230187a5
-
SSDEEP
12288:iCvK8MxLli5Wqsy4Kx7EkPdBdtueuu0Wdbcx07TlszGk+:tvK8MHi5WuLtdBfL9szG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 759bc38db75e7356df258d6c5ec65d2008088110d18800e4cc705835d1e39abb
Files
-
759bc38db75e7356df258d6c5ec65d2008088110d18800e4cc705835d1e39abb.exe windows x86
85e20b41c8c4f7a1bee35acd3f209bbf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
CloseHandle
LoadLibraryW
LoadResource
FindResourceW
GetProcAddress
LocalFree
GetFileSize
FreeLibrary
lstrcmpiW
LoadLibraryExW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
WideCharToMultiByte
SetNamedPipeHandleState
WriteFile
PeekNamedPipe
WaitForSingleObject
GetModuleHandleA
PostQueuedCompletionStatus
QueueUserWorkItem
CreateEventW
FormatMessageW
SetEvent
GetNamedPipeHandleStateW
GetQueuedCompletionStatusEx
SwitchToThread
CreateIoCompletionPort
WaitNamedPipeW
WriteConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
VirtualAlloc
HeapReAlloc
HeapSize
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
RtlUnwind
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
OutputDebugStringW
LoadLibraryExA
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
GetProcessHeap
HeapFree
HeapAlloc
EncodePointer
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
GetCommandLineW
VirtualFree
SizeofResource
ReadFile
MulDiv
lstrcmpW
GlobalUnlock
DeleteCriticalSection
GlobalLock
DecodePointer
RaiseException
GlobalAlloc
GetLastError
MultiByteToWideChar
GetModuleHandleW
GetCurrentThreadId
InitializeCriticalSectionEx
LeaveCriticalSection
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
GetVersionExA
CreateFileA
GetVolumeInformationA
DeviceIoControl
SetPriorityClass
GetPrivateProfileStringA
CreateDirectoryA
WritePrivateProfileStringA
lstrcpyA
GetFileAttributesA
lstrcatA
EnterCriticalSection
SetLastError
GetTempPathW
user32
BeginPaint
ReleaseDC
InvalidateRect
ReleaseCapture
GetWindowTextW
GetParent
GetClassInfoExW
GetDesktopWindow
GetDlgItem
GetClientRect
SetWindowLongW
SetCapture
GetClassNameW
EndPaint
RegisterWindowMessageW
LoadCursorW
CharNextW
SetFocus
wsprintfW
GetKeyState
FindWindowExW
GetWindowRect
SetForegroundWindow
PostMessageW
ShowWindow
SetClassLongW
SetParent
CreateAcceleratorTableW
DispatchMessageW
SetTimer
PeekMessageW
ChangeWindowMessageFilter
TranslateMessage
GetWindowLongW
GetWindowTextLengthW
DefWindowProcW
CallWindowProcW
GetWindow
GetFocus
DestroyWindow
GetDC
SetWindowPos
FillRect
CreateWindowExW
ScreenToClient
SendMessageW
UnregisterClassW
SetWindowTextW
RegisterClassExW
IsWindow
InvalidateRgn
RedrawWindow
ClientToScreen
DestroyAcceleratorTable
IsChild
GetSysColor
MoveWindow
GetMessageW
gdi32
DeleteObject
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetStockObject
GetDeviceCaps
DeleteDC
GetObjectW
CreateSolidBrush
advapi32
RegEnumKeyExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
shell32
DragQueryFileW
CommandLineToArgvW
SHGetSpecialFolderPathA
DragFinish
ole32
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleInitialize
CLSIDFromString
OleLockRunning
CoInitialize
CoTaskMemRealloc
OleUninitialize
CoTaskMemFree
oleaut32
DispCallFunc
SysAllocString
OleCreateFontIndirect
SysFreeString
LoadTypeLi
VariantInit
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
SysStringLen
VariantClear
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
iphlpapi
GetAdaptersInfo
shlwapi
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
PathCombineW
comctl32
_TrackMouseEvent
Sections
.text Size: 285KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ