Static task
static1
Behavioral task
behavioral1
Sample
5576e3a30bbd147f8ff71082724b74b67393bc82e1e876e2559fed8f67aec1f3.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5576e3a30bbd147f8ff71082724b74b67393bc82e1e876e2559fed8f67aec1f3.exe
Resource
win10v2004-20230703-en
General
-
Target
5576e3a30bbd147f8ff71082724b74b67393bc82e1e876e2559fed8f67aec1f3
-
Size
597KB
-
MD5
d414b7e8796c238e38dc034189a78012
-
SHA1
5f01c69c55d458c653e78c42a51223ac6c1e911c
-
SHA256
5576e3a30bbd147f8ff71082724b74b67393bc82e1e876e2559fed8f67aec1f3
-
SHA512
8747ee6d4eb011c22927bc5f80b77287c214a708597665cd394b75a3a8f4242c6e21d6b525842a7d89d9c5c91a48a6a6ee17f7cd94d12559c6b6e53c7919aa33
-
SSDEEP
12288:jCvR8MxLli5Wqsy4Kx7EkPdBdtueuu0Wdbcx07TPA/m06aCzE6hFtGk+:2vR8MHi5WuLtdBfLHA8tG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5576e3a30bbd147f8ff71082724b74b67393bc82e1e876e2559fed8f67aec1f3
Files
-
5576e3a30bbd147f8ff71082724b74b67393bc82e1e876e2559fed8f67aec1f3.exe windows x86
85e20b41c8c4f7a1bee35acd3f209bbf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
CloseHandle
LoadLibraryW
LoadResource
FindResourceW
GetProcAddress
LocalFree
GetFileSize
FreeLibrary
lstrcmpiW
LoadLibraryExW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
WideCharToMultiByte
SetNamedPipeHandleState
WriteFile
PeekNamedPipe
WaitForSingleObject
GetModuleHandleA
PostQueuedCompletionStatus
QueueUserWorkItem
CreateEventW
FormatMessageW
SetEvent
GetNamedPipeHandleStateW
GetQueuedCompletionStatusEx
SwitchToThread
CreateIoCompletionPort
WaitNamedPipeW
WriteConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
VirtualAlloc
HeapReAlloc
HeapSize
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
RtlUnwind
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
OutputDebugStringW
LoadLibraryExA
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
GetProcessHeap
HeapFree
HeapAlloc
EncodePointer
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
GetCommandLineW
VirtualFree
SizeofResource
ReadFile
MulDiv
lstrcmpW
GlobalUnlock
DeleteCriticalSection
GlobalLock
DecodePointer
RaiseException
GlobalAlloc
GetLastError
MultiByteToWideChar
GetModuleHandleW
GetCurrentThreadId
InitializeCriticalSectionEx
LeaveCriticalSection
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
GetVersionExA
CreateFileA
GetVolumeInformationA
DeviceIoControl
SetPriorityClass
GetPrivateProfileStringA
CreateDirectoryA
WritePrivateProfileStringA
lstrcpyA
GetFileAttributesA
lstrcatA
EnterCriticalSection
SetLastError
GetTempPathW
user32
BeginPaint
ReleaseDC
InvalidateRect
ReleaseCapture
GetWindowTextW
GetParent
GetClassInfoExW
GetDesktopWindow
GetDlgItem
GetClientRect
SetWindowLongW
SetCapture
GetClassNameW
EndPaint
RegisterWindowMessageW
LoadCursorW
CharNextW
SetFocus
wsprintfW
GetKeyState
FindWindowExW
GetWindowRect
SetForegroundWindow
PostMessageW
ShowWindow
SetClassLongW
SetParent
CreateAcceleratorTableW
DispatchMessageW
SetTimer
PeekMessageW
ChangeWindowMessageFilter
TranslateMessage
GetWindowLongW
GetWindowTextLengthW
DefWindowProcW
CallWindowProcW
GetWindow
GetFocus
DestroyWindow
GetDC
SetWindowPos
FillRect
CreateWindowExW
ScreenToClient
SendMessageW
UnregisterClassW
SetWindowTextW
RegisterClassExW
IsWindow
InvalidateRgn
RedrawWindow
ClientToScreen
DestroyAcceleratorTable
IsChild
GetSysColor
MoveWindow
GetMessageW
gdi32
DeleteObject
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetStockObject
GetDeviceCaps
DeleteDC
GetObjectW
CreateSolidBrush
advapi32
RegEnumKeyExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
shell32
DragQueryFileW
CommandLineToArgvW
SHGetSpecialFolderPathA
DragFinish
ole32
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleInitialize
CLSIDFromString
OleLockRunning
CoInitialize
CoTaskMemRealloc
OleUninitialize
CoTaskMemFree
oleaut32
DispCallFunc
SysAllocString
OleCreateFontIndirect
SysFreeString
LoadTypeLi
VariantInit
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
SysStringLen
VariantClear
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
iphlpapi
GetAdaptersInfo
shlwapi
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
PathCombineW
comctl32
_TrackMouseEvent
Sections
.text Size: 285KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ