Static task
static1
Behavioral task
behavioral1
Sample
acdbf76d9b743fe82ebea0fa9e9e439e438b9423a7d20d91e44de239398903fd.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
acdbf76d9b743fe82ebea0fa9e9e439e438b9423a7d20d91e44de239398903fd.exe
Resource
win10v2004-20230703-en
General
-
Target
acdbf76d9b743fe82ebea0fa9e9e439e438b9423a7d20d91e44de239398903fd
-
Size
4.4MB
-
MD5
bf2c70feaa95b8570433708daab755a4
-
SHA1
2c00aeda7e9fc7f0b439d8efac1814bd546ae0fd
-
SHA256
acdbf76d9b743fe82ebea0fa9e9e439e438b9423a7d20d91e44de239398903fd
-
SHA512
4ba9ee792b19eb374f789e0291871acb23cac711842259a2a41d18166a82a13af0f765dd335f11571b9081194fe0c1dc6d2cb067f746f7049c3fec7d7b47fe56
-
SSDEEP
49152:4hihnSlO9U/g+TgWnZvzt5GToeevyy0D9GJEjJyZB1lT3bZmXvg2MrPpLxPtA7zK:4hMwOMz3EjJyjZmfqbpL64wybtFAXzQd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource acdbf76d9b743fe82ebea0fa9e9e439e438b9423a7d20d91e44de239398903fd
Files
-
acdbf76d9b743fe82ebea0fa9e9e439e438b9423a7d20d91e44de239398903fd.exe windows x64
a1dd381f5eec0ecc7785f25223060181
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ole32
StringFromGUID2
OleInitialize
OleUninitialize
CoUninitialize
CoInitialize
OleRun
OleSetContainedObject
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
IIDFromString
CoTaskMemAlloc
shell32
SHGetFolderPathW
FindExecutableA
CommandLineToArgvW
SHGetFolderPathA
user32
IsWindowUnicode
PeekMessageA
MsgWaitForMultipleObjectsEx
DispatchMessageW
GetMessageW
CreateWindowExA
DefWindowProcA
SetWindowLongPtrA
PostQuitMessage
GetWindowLongPtrA
RegisterClassExA
GetAncestor
GetWindowThreadProcessId
GetFocus
IsChild
SetFocus
SetRect
DefWindowProcW
GetSystemMenu
AdjustWindowRectEx
GetWindowRect
DispatchMessageA
GetMessageA
TranslateMessage
MessageBoxA
wsprintfA
LoadStringA
CharNextA
ReleaseDC
GetParent
GetClassInfoExW
EnableMenuItem
GetDesktopWindow
GetClientRect
SendMessageA
ShowWindow
RegisterClassExW
GetWindowLongPtrW
SetWindowTextW
CreateWindowExW
SetWindowLongPtrW
LoadCursorA
DestroyWindow
GetDC
SetWindowPos
kernel32
VirtualProtect
VirtualAlloc
GetSystemInfo
RtlPcToFileHeader
RtlUnwindEx
GetConsoleMode
GetStartupInfoW
GetFileType
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetStdHandle
GetModuleFileNameW
WriteConsoleW
ExitThread
VirtualQuery
IsProcessorFeaturePresent
GetConsoleCP
FreeLibraryAndExitThread
CreateDirectoryW
InitializeSListHead
DeleteFileW
GetDriveTypeW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
GetFullPathNameW
SetStdHandle
IsValidLocale
EnumSystemLocalesW
HeapAlloc
HeapSize
HeapReAlloc
HeapFree
GetFileSizeEx
FlushFileBuffers
ReadConsoleW
GetCurrentDirectoryW
GetModuleFileNameA
SizeofResource
GetCommandLineW
LoadLibraryExA
InitializeCriticalSectionAndSpinCount
FindResourceA
GetModuleHandleA
GetCommandLineA
MultiByteToWideChar
GetLastError
SetEvent
SetDllDirectoryA
CloseHandle
RaiseException
CreateThread
IsDBCSLeadByte
LoadResource
DecodePointer
GetProcAddress
DeleteCriticalSection
GetTimeZoneInformation
WideCharToMultiByte
lstrcmpiA
CreateEventA
WriteFile
lstrlenA
lstrcatA
GetTempPathA
CreateFileA
GetSystemDirectoryA
LockResource
DeleteFileA
CreateDirectoryA
LocalFree
ReadFile
MulDiv
LocalAlloc
GetCurrentThreadId
FormatMessageA
Sleep
GetUserDefaultLCID
FileTimeToSystemTime
FindFirstFileA
TerminateProcess
FindClose
WaitForSingleObject
GetWindowsDirectoryA
ExitProcess
SetHandleInformation
CreatePipe
PeekNamedPipe
RemoveDirectoryA
CreateProcessA
GetExitCodeProcess
SetLastError
FindNextFileA
GetFileAttributesA
MoveFileExA
SetFileAttributesA
GetTickCount
GetCurrentProcess
GetModuleHandleExW
GetNativeSystemInfo
GetSystemWow64DirectoryA
FormatMessageW
GetLocalTime
GetCurrentProcessId
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
RtlUnwind
LoadLibraryExW
SetEndOfFile
SetFilePointerEx
GetExitCodeThread
OpenThread
GetModuleHandleExA
LoadLibraryW
CreateMutexA
ReleaseMutex
QueryPerformanceFrequency
QueryPerformanceCounter
CreateFileW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetStringTypeW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
FreeLibrary
OpenMutexA
advapi32
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegEnumKeyExA
RegQueryValueExA
GetTokenInformation
OpenProcessToken
CopySid
ConvertStringSecurityDescriptorToSecurityDescriptorA
ConvertSidToStringSidA
ConvertStringSecurityDescriptorToSecurityDescriptorW
oleaut32
GetErrorInfo
VariantInit
SysAllocString
VariantCopy
VariantChangeType
VariantClear
SysFreeString
VarUI4FromStr
shlwapi
PathAppendA
gdi32
GetDeviceCaps
crypt32
CryptProtectData
CryptStringToBinaryA
CryptBinaryToStringA
CryptUnprotectData
version
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
msi
ord158
ord67
ord87
ord91
ord160
ord31
ord168
ord137
ord189
ord159
ord115
ord141
ord44
ord204
ord117
ord8
Sections
.text Size: 624KB - Virtual size: 624KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 267KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 169.3MB - Virtual size: 169.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ