Static task
static1
Behavioral task
behavioral1
Sample
1640e6b66701d34065872101426acf498dc0b391a1caa196eac903c71e83db66.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1640e6b66701d34065872101426acf498dc0b391a1caa196eac903c71e83db66.exe
Resource
win10v2004-20230703-en
General
-
Target
1640e6b66701d34065872101426acf498dc0b391a1caa196eac903c71e83db66
-
Size
597KB
-
MD5
c2ef7d79d05ac6ec5e2d5dacbc44b08d
-
SHA1
c0ed8e1c92f6c2becc6dc2227dbf9064bb1df00d
-
SHA256
1640e6b66701d34065872101426acf498dc0b391a1caa196eac903c71e83db66
-
SHA512
7d3c94148b4b73248dfd4fe66ffc031c7b8d816a4e4012413638d43625f39638bfe31bf1a8024b2572d12b5534d8026b1ca40056bb5401070b901965854dcd64
-
SSDEEP
12288:5CvR8MxLli5Wqsy4Kx7EkPdBdtueuu0Wdbcx07TJA/m06aCzE6hFtGk+:svR8MHi5WuLtdBfLhA8tG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1640e6b66701d34065872101426acf498dc0b391a1caa196eac903c71e83db66
Files
-
1640e6b66701d34065872101426acf498dc0b391a1caa196eac903c71e83db66.exe windows x86
85e20b41c8c4f7a1bee35acd3f209bbf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
CloseHandle
LoadLibraryW
LoadResource
FindResourceW
GetProcAddress
LocalFree
GetFileSize
FreeLibrary
lstrcmpiW
LoadLibraryExW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
WideCharToMultiByte
SetNamedPipeHandleState
WriteFile
PeekNamedPipe
WaitForSingleObject
GetModuleHandleA
PostQueuedCompletionStatus
QueueUserWorkItem
CreateEventW
FormatMessageW
SetEvent
GetNamedPipeHandleStateW
GetQueuedCompletionStatusEx
SwitchToThread
CreateIoCompletionPort
WaitNamedPipeW
WriteConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
VirtualAlloc
HeapReAlloc
HeapSize
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
RtlUnwind
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
OutputDebugStringW
LoadLibraryExA
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
GetProcessHeap
HeapFree
HeapAlloc
EncodePointer
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
GetCommandLineW
VirtualFree
SizeofResource
ReadFile
MulDiv
lstrcmpW
GlobalUnlock
DeleteCriticalSection
GlobalLock
DecodePointer
RaiseException
GlobalAlloc
GetLastError
MultiByteToWideChar
GetModuleHandleW
GetCurrentThreadId
InitializeCriticalSectionEx
LeaveCriticalSection
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
GetVersionExA
CreateFileA
GetVolumeInformationA
DeviceIoControl
SetPriorityClass
GetPrivateProfileStringA
CreateDirectoryA
WritePrivateProfileStringA
lstrcpyA
GetFileAttributesA
lstrcatA
EnterCriticalSection
SetLastError
GetTempPathW
user32
BeginPaint
ReleaseDC
InvalidateRect
ReleaseCapture
GetWindowTextW
GetParent
GetClassInfoExW
GetDesktopWindow
GetDlgItem
GetClientRect
SetWindowLongW
SetCapture
GetClassNameW
EndPaint
RegisterWindowMessageW
LoadCursorW
CharNextW
SetFocus
wsprintfW
GetKeyState
FindWindowExW
GetWindowRect
SetForegroundWindow
PostMessageW
ShowWindow
SetClassLongW
SetParent
CreateAcceleratorTableW
DispatchMessageW
SetTimer
PeekMessageW
ChangeWindowMessageFilter
TranslateMessage
GetWindowLongW
GetWindowTextLengthW
DefWindowProcW
CallWindowProcW
GetWindow
GetFocus
DestroyWindow
GetDC
SetWindowPos
FillRect
CreateWindowExW
ScreenToClient
SendMessageW
UnregisterClassW
SetWindowTextW
RegisterClassExW
IsWindow
InvalidateRgn
RedrawWindow
ClientToScreen
DestroyAcceleratorTable
IsChild
GetSysColor
MoveWindow
GetMessageW
gdi32
DeleteObject
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetStockObject
GetDeviceCaps
DeleteDC
GetObjectW
CreateSolidBrush
advapi32
RegEnumKeyExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
shell32
DragQueryFileW
CommandLineToArgvW
SHGetSpecialFolderPathA
DragFinish
ole32
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleInitialize
CLSIDFromString
OleLockRunning
CoInitialize
CoTaskMemRealloc
OleUninitialize
CoTaskMemFree
oleaut32
DispCallFunc
SysAllocString
OleCreateFontIndirect
SysFreeString
LoadTypeLi
VariantInit
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
SysStringLen
VariantClear
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
iphlpapi
GetAdaptersInfo
shlwapi
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
PathCombineW
comctl32
_TrackMouseEvent
Sections
.text Size: 285KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ