Static task
static1
Behavioral task
behavioral1
Sample
31b0d427067c91e8dab3bcf5498d7c388d4af184fbab8872cbb04b49b88add4f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
31b0d427067c91e8dab3bcf5498d7c388d4af184fbab8872cbb04b49b88add4f.exe
Resource
win10v2004-20230703-en
General
-
Target
31b0d427067c91e8dab3bcf5498d7c388d4af184fbab8872cbb04b49b88add4f
-
Size
2.6MB
-
MD5
648708b7c0ddbbc82c9354a80d6c092d
-
SHA1
9ffb0e254a1471c5971ae1314c3ca6a18a66ea6a
-
SHA256
31b0d427067c91e8dab3bcf5498d7c388d4af184fbab8872cbb04b49b88add4f
-
SHA512
655cd378ef4c085f4a96ba3168796e27d97a757260701e82560159987413e382dae884428497663cfad2fd7a3abb283a8d9bbd6023ac70dc5878ebdfcdab6538
-
SSDEEP
24576:rfKrpDVxfFCo53qQp1anxI+/ExJu7KHleCosnW95Z+jX78+eauUkTnDiqZj:7KppxfFjUwdWTZObHuUkDiq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 31b0d427067c91e8dab3bcf5498d7c388d4af184fbab8872cbb04b49b88add4f
Files
-
31b0d427067c91e8dab3bcf5498d7c388d4af184fbab8872cbb04b49b88add4f.exe windows x86
a08ef8aa39fefa7a972c4ba4bc0fa9a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
HeapReAlloc
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
HeapCreate
GetStdHandle
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
GetSystemInfo
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
VirtualAlloc
VirtualProtect
RaiseException
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapFree
HeapAlloc
GetFileTime
GetFileSizeEx
GetFileAttributesA
FileTimeToLocalFileTime
GetTickCount
SetErrorMode
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetOEMCP
FileTimeToSystemTime
GetThreadLocale
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetModuleHandleW
GlobalFlags
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetCurrentThreadId
CloseHandle
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
GlobalFree
GlobalAlloc
FormatMessageA
LocalFree
GetCurrentProcessId
GlobalLock
GlobalUnlock
MulDiv
GetSystemDefaultLangID
GetCurrentProcess
Sleep
GetModuleFileNameA
lstrcmpiA
FreeResource
FindResourceA
LoadResource
LockResource
SizeofResource
GetProcAddress
GetModuleHandleA
LoadLibraryA
GetLastError
SetLastError
GetCPInfo
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrlenA
GetVersionExA
FreeEnvironmentStringsW
GetVersion
user32
SetCapture
CharNextA
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
CharUpperA
RegisterClipboardFormatA
PostThreadMessageA
EndDialog
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
SetActiveWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
UpdateWindow
IsRectEmpty
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
GetWindowPlacement
GetWindow
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
ValidateRect
UnhookWindowsHookEx
IntersectRect
DestroyMenu
GetMenuStringA
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
MessageBoxA
EndPaint
BeginPaint
GetWindowDC
ScreenToClient
SetWindowLongA
IsWindow
PtInRect
TrackPopupMenu
EnableMenuItem
GetCursorPos
SetForegroundWindow
CopyRect
GetSysColor
FillRect
DrawEdge
DrawIcon
IsIconic
KillTimer
SetTimer
GetSystemMenu
LoadIconA
LoadImageA
CreateIconIndirect
GetIconInfo
DrawStateA
GetClientRect
DrawFocusRect
OffsetRect
UnregisterClassA
LoadCursorA
ReleaseCapture
InflateRect
FrameRect
PostMessageA
GetWindowRect
CreateWindowExA
CreateDialogIndirectParamA
SetRect
GetMenuItemInfoA
DrawTextA
SystemParametersInfoA
DrawIconEx
DestroyIcon
GetSystemMetrics
GetDesktopWindow
GetDC
ReleaseDC
AppendMenuA
GetMenuItemCount
ModifyMenuA
GetMenuState
GetMenuItemID
CreateMenu
CreatePopupMenu
GetSysColorBrush
LoadBitmapA
GetSubMenu
EnableWindow
TabbedTextOutA
DrawTextExA
GrayStringA
DestroyCursor
GetWindowLongA
SendMessageA
IsMenu
GetNextDlgTabItem
GetParent
SetCursor
InvalidateRect
ClientToScreen
WindowFromPoint
GetActiveWindow
GetDlgItem
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetWindowExtEx
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetViewportExtEx
MoveToEx
LineTo
GetClipBox
CreateCompatibleDC
SetBkMode
RestoreDC
SaveDC
CreatePatternBrush
SetTextColor
SetBkColor
CreateBitmap
GetStockObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
PatBlt
SetPixel
GetPixel
GetObjectA
DeleteDC
DeleteObject
SelectObject
CreateDIBSection
Ellipse
GetTextExtentPoint32A
GetTextExtentPoint32W
CreateFontIndirectA
GetBkMode
CreatePen
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleBitmap
SetMapMode
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteKeyA
RegQueryValueExA
RegCloseKey
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
shell32
Shell_NotifyIconA
ShellExecuteExA
comctl32
_TrackMouseEvent
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleIsCurrentClipboard
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysAllocStringLen
Sections
.text Size: 247KB - Virtual size: 246KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ