Static task
static1
Behavioral task
behavioral1
Sample
6f132e29796bacf1df9091a8daae54fe8b80263bd9c0cddf7b55f4fb4f0c8752.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6f132e29796bacf1df9091a8daae54fe8b80263bd9c0cddf7b55f4fb4f0c8752.exe
Resource
win10v2004-20230703-en
General
-
Target
6f132e29796bacf1df9091a8daae54fe8b80263bd9c0cddf7b55f4fb4f0c8752
-
Size
530KB
-
MD5
90f50a89fb42ff5476852269616a7145
-
SHA1
9f428ebe437a76b393f50c5c61068adf6fb324f1
-
SHA256
6f132e29796bacf1df9091a8daae54fe8b80263bd9c0cddf7b55f4fb4f0c8752
-
SHA512
0bc9db5ac50d99e9bd7ec481342845f1981be64c9155222847623e2dcd3752fdf7b0daa088abe026a600dc748d0d0b187eb99d2b8d293d865e55b16e64933697
-
SSDEEP
6144:I7b04B5lmxMkHVTPqYldga1ZXY0MWAoL6DIqTzBnO42QGcP91GeV0k:0AVTpVMWAoL6jBnOmf1G2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f132e29796bacf1df9091a8daae54fe8b80263bd9c0cddf7b55f4fb4f0c8752
Files
-
6f132e29796bacf1df9091a8daae54fe8b80263bd9c0cddf7b55f4fb4f0c8752.exe windows x86
852dd14fff329b3ea1bbee543eab199a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
checkusb
IsBMUDisk
OpenRedDiskSecDisk
LogInBMUW
OpenSecDisk
CheckSignDataW
FormatW
IsAlreadyLogInW
ReadRedDiskParaArea
GetSectorBytes
WriteParaArea
TestSecDiskPassword
WriteRedDiskParaArea
GetRedDiskSectorBytes
BuildControlParam
TestRedDiskPassword
GetUsbDIskInfo
ReadParaArea
GetHardPassword
ws2_32
gethostname
WSAStartup
gethostbyname
inet_ntoa
inet_addr
kernel32
GetCPInfo
GetOEMCP
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetTickCount
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitThread
CreateThread
HeapSize
GetACP
IsValidCodePage
GetStdHandle
InitializeCriticalSectionAndSpinCount
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
WideCharToMultiByte
SizeofResource
LockResource
LoadResource
FindResourceA
OutputDebugStringA
HeapAlloc
GetProcessHeap
CreateMutexA
GetLastError
HeapFree
GetPrivateProfileStringA
LoadLibraryA
GetPrivateProfileIntA
Sleep
FreeLibrary
SetEvent
CloseHandle
GetSystemDirectoryA
WaitForSingleObject
CreateEventA
ResetEvent
CreateDirectoryA
CopyFileA
CreateFileA
GetLogicalDrives
GetProcAddress
FreeResource
GlobalFree
GlobalUnlock
GlobalLock
lstrlenA
MulDiv
FileTimeToSystemTime
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetModuleHandleW
GlobalFlags
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
SuspendThread
ResumeThread
SetThreadPriority
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetModuleHandleA
GetVersionExA
SetLastError
GlobalAlloc
FormatMessageA
LocalFree
MultiByteToWideChar
FreeEnvironmentStringsA
user32
CopyAcceleratorTableA
CharNextA
ReleaseCapture
SetCapture
DestroyMenu
LoadCursorA
GetSysColorBrush
CharUpperA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetNextDlgGroupItem
PostThreadMessageA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
CreateWindowExA
InvalidateRgn
InvalidateRect
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
SetWindowLongA
SetWindowPos
OffsetRect
RegisterClipboardFormatA
UnregisterClassA
GetCapture
MessageBeep
SetRect
IsChild
IsRectEmpty
EnableWindow
SendMessageA
MessageBoxA
LoadIconA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
PostMessageA
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongA
IsWindow
DestroyWindow
CreateDialogIndirectParamA
SetActiveWindow
GetActiveWindow
GetDesktopWindow
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetWindow
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
gdi32
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
OffsetViewportOrgEx
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegOpenKeyExA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
shell32
ShellExecuteExA
comctl32
InitCommonControlsEx
shlwapi
PathStripToRootA
PathRemoveFileSpecW
PathIsUNCA
PathFindExtensionA
PathFileExistsA
StrToIntExA
PathFindFileNameA
oledlg
ord8
ole32
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoInitializeEx
CoFreeUnusedLibraries
CoUninitialize
CLSIDFromString
OleFlushClipboard
CoTaskMemAlloc
OleInitialize
CoRevokeClassObject
CoCreateInstance
OleIsCurrentClipboard
CoTaskMemFree
CoRegisterMessageFilter
CLSIDFromProgID
oleaut32
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
rpcrt4
RpcStringFreeA
UuidToStringA
Sections
.text Size: 239KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ