Static task
static1
Behavioral task
behavioral1
Sample
8848c5b513a4efaa5ea873f70daeeb13bcee1918abb40a0917c6186636f3984c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8848c5b513a4efaa5ea873f70daeeb13bcee1918abb40a0917c6186636f3984c.exe
Resource
win10v2004-20230703-en
General
-
Target
8848c5b513a4efaa5ea873f70daeeb13bcee1918abb40a0917c6186636f3984c
-
Size
2.4MB
-
MD5
94e697401eb9e5d00cbcb9f2ee048227
-
SHA1
dc20744dca669874e1e3c3fd8aeb047e3d396ece
-
SHA256
8848c5b513a4efaa5ea873f70daeeb13bcee1918abb40a0917c6186636f3984c
-
SHA512
0ae4598bcb3735f9abbe367553443e34c110abdab5b70c7f91751a88caa677781832f95b8a5e9722e42ad7c05944ccfb87e62adbf6585aab9f4bf691c572a88e
-
SSDEEP
49152:obTb8Egs9C+6q92/MBHNfU/nC+73FBkUBDTa9vDeI0INLlKtX8nXpP7uewA0Xcsu:0Tl4bHa9vDHnnXiA0M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8848c5b513a4efaa5ea873f70daeeb13bcee1918abb40a0917c6186636f3984c
Files
-
8848c5b513a4efaa5ea873f70daeeb13bcee1918abb40a0917c6186636f3984c.exe windows x86
0bc454af8ac5f6adb52f26730102a217
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOverlappedResult
CreateNamedPipeW
SetNamedPipeHandleState
DisconnectNamedPipe
ConnectNamedPipe
CreateFileW
ReleaseMutex
ResetEvent
WinExec
GetBinaryTypeW
FindNextFileW
FindClose
ExpandEnvironmentStringsW
CreateThread
WritePrivateProfileStructW
GetPrivateProfileStructW
WritePrivateProfileStringW
GetPrivateProfileIntW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
MoveFileExW
GetPrivateProfileStringW
lstrcpyW
GlobalLock
GlobalUnlock
GlobalAlloc
GetTickCount
GetVersion
GetCurrentThread
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetStdHandle
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetStdHandle
GetTimeZoneInformation
TerminateProcess
GetConsoleCP
SetFilePointerEx
GetFileType
GetModuleHandleExW
ExitThread
GetFileAttributesExW
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
SuspendThread
SetThreadContext
GetThreadContext
VirtualQuery
FlushFileBuffers
GetSystemWindowsDirectoryW
InterlockedCompareExchange
lstrcmpiA
lstrcmpA
GlobalFree
UnhandledExceptionFilter
GetTempFileNameW
GetLocalTime
ResumeThread
Sleep
GetTempPathW
WriteFile
SetFileAttributesW
SetFileAttributesA
SetEndOfFile
ReadFile
GetFileSize
GetFileAttributesA
CreateFileA
WideCharToMultiByte
lstrlenW
lstrcpynW
FreeLibrary
WaitForMultipleObjects
CreateEventW
SetEvent
IsBadReadPtr
GetModuleFileNameW
VirtualProtect
GetCurrentThreadId
GetCurrentProcessId
WaitForSingleObject
SetUnhandledExceptionFilter
OutputDebugStringW
MultiByteToWideChar
LoadLibraryW
FindResourceW
SizeofResource
LockResource
LoadResource
GetProcAddress
GetModuleHandleW
FindResourceExW
GetSystemDirectoryW
lstrcmpW
FreeResource
ExitProcess
MulDiv
GetACP
InterlockedDecrement
InterlockedIncrement
LocalFree
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
GetExitCodeThread
SwitchToThread
WaitForSingleObjectEx
DuplicateHandle
TryEnterCriticalSection
FormatMessageW
GetStringTypeW
SetFilePointer
GetFileSizeEx
OpenFileMappingW
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
GetVersionExW
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
DeviceIoControl
GetCommandLineW
GetStartupInfoW
CreateProcessW
GetCurrentProcess
CreateMutexW
CloseHandle
DeleteFileW
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
GetConsoleMode
DecodePointer
user32
PostQuitMessage
ShowWindow
EnableWindow
GetWindow
GetAsyncKeyState
keybd_event
GetMenuStringW
GetMessageW
PtInRect
MapWindowPoints
ScreenToClient
ClientToScreen
DispatchMessageW
GetClientRect
KillTimer
SetTimer
GetFocus
SetFocus
DestroyWindow
SendMessageW
GetMonitorInfoW
MonitorFromPoint
GetParent
CopyRect
GetCursorPos
ReleaseCapture
GetWindowRect
SetCapture
MoveWindow
FindWindowW
IsWindow
SetWindowPos
UnregisterClassW
PostMessageW
RegisterWindowMessageW
TranslateMessage
CreatePopupMenu
FindWindowExW
GetActiveWindow
IsClipboardFormatAvailable
EnumThreadWindows
ChangeWindowMessageFilter
ClipCursor
IsWindowEnabled
GetKeyState
AddClipboardFormatListener
IsIconic
IsWindowVisible
SetWindowPlacement
GetWindowPlacement
UnregisterHotKey
RegisterHotKey
OffsetRect
FrameRect
FillRect
GetCaretPos
SetCaretPos
InvalidateRect
EndPaint
BeginPaint
GetWindowDC
DrawTextW
CallWindowProcW
IsZoomed
MapVirtualKeyW
GetKeyNameTextW
MessageBoxExW
SetWindowTextW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetClassNameW
SetWindowLongW
WindowFromPoint
MsgWaitForMultipleObjects
CreateWindowExW
RegisterClassExW
GetDoubleClickTime
DefWindowProcW
PeekMessageW
EnumDisplayMonitors
MonitorFromWindow
MonitorFromRect
DestroyMenu
DrawIconEx
DestroyIcon
GetWindowThreadProcessId
GetWindowLongW
IntersectRect
ReleaseDC
GetDC
SetForegroundWindow
GetForegroundWindow
InsertMenuItemW
EmptyClipboard
RegisterClipboardFormatW
GetClipboardData
SetClipboardData
CloseClipboard
OpenClipboard
BringWindowToTop
AttachThreadInput
GetAncestor
TrackPopupMenuEx
wsprintfW
wvsprintfW
SetCursor
InflateRect
UnionRect
LoadCursorW
IsChild
UpdateLayeredWindow
CharNextW
GetUpdateRect
CreateCaret
GetCaretBlinkTime
IsRectEmpty
RegisterClassW
GetClassInfoExW
GetSystemMetrics
SetPropW
GetPropW
LoadImageW
SystemParametersInfoW
SetWindowRgn
MessageBoxW
GetWindowTextW
GetWindowTextLengthW
RemovePropW
CharPrevW
SetRect
HideCaret
ShowCaret
GetSysColor
CreateAcceleratorTableW
InvalidateRgn
DeleteMenu
GetMenuItemCount
GetIconInfo
gdi32
GetDeviceCaps
CreateFontIndirectW
CreatePen
Rectangle
RestoreDC
SaveDC
GetTextMetricsW
SetWindowOrgEx
DeleteDC
CombineRgn
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
SelectClipRgn
BitBlt
StretchBlt
SetStretchBltMode
SetDIBColorTable
TextOutW
GetDIBits
SetDIBitsToDevice
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
CreateSolidBrush
SelectObject
SetBkColor
SetBkMode
SetTextColor
ExtTextOutW
CreateDIBSection
GetObjectW
CreateDCW
ExtSelectClipRgn
GetTextExtentPoint32W
CreateRoundRectRgn
GetStockObject
advapi32
RegOpenKeyExA
RegEnumKeyExA
RegCreateKeyW
RegGetValueW
RegQueryValueExA
RegCloseKey
RegOpenKeyExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
GetTokenInformation
OpenProcessToken
RegQueryValueExW
shell32
SHCreateShellItemArrayFromShellItem
SHGetKnownFolderItem
DragQueryFileW
ShellExecuteW
SHGetIDListFromObject
ord152
SHGetFileInfoW
SHCreateItemFromIDList
SHCreateItemFromParsingName
ord18
DragFinish
ord190
ord727
SHBrowseForFolderW
SHParseDisplayName
SHBindToParent
ord68
SHGetDesktopFolder
SHGetSpecialFolderPathW
ord21
ord155
ShellExecuteExW
ord25
SHGetPathFromIDListW
ord165
ole32
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
OleInitialize
OleUninitialize
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CoCreateGuid
ReleaseStgMedium
CoLockObjectExternal
RegisterDragDrop
RevokeDragDrop
DoDragDrop
OleSetClipboard
OleGetClipboard
oleaut32
SysAllocString
VariantClear
VariantInit
SafeArrayCreate
SafeArrayPutElement
SysFreeString
shlwapi
PathFindFileNameW
PathFindExtensionW
StrRetToStrW
wnsprintfW
ord158
ord219
StrStrIW
StrRetToBufW
PathRemoveFileSpecW
PathIsDirectoryW
PathFileExistsW
PathCombineW
PathAppendW
ord176
StrCpyW
ord172
ord174
StrStrIA
SHAutoComplete
SHGetValueA
SHSetValueA
StrCmpNIW
StrCmpIW
StrTrimA
urlmon
URLDownloadToFileW
URLDownloadToCacheFileW
gdiplus
GdipDrawImageRectI
GdipLoadImageFromStreamICM
GdipImageGetFrameDimensionsCount
GdipLoadImageFromFileICM
GdipImageGetFrameCount
GdipLoadImageFromFile
GdipDrawEllipseI
GdipAddPathArc
GdipDrawImageRectRectI
GdipDrawImagePointsI
GdipFillPath
GdipGraphicsClear
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdiplusStartup
GdipGetImagePixelFormat
GdipCloneBitmapAreaI
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStreamICM
GdipImageGetFrameDimensionsList
GdipAlloc
GdipFree
GdipCreateBitmapFromStream
GdipCreateTexture
GdipClosePathFigure
GdipFillEllipseI
GdipDrawPath
GdipGetPropertyItem
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipDrawImageRectRect
GdipSetInterpolationMode
GdipSetSmoothingMode
GdipDeleteGraphics
GdipBitmapSetPixel
GdipCreateBitmapFromScan0
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipSaveImageToFile
GdipDisposeImage
GdiplusShutdown
GdipDrawRectangleI
GdipCreatePath
GdipDeletePath
GdipAddPathLineI
GdipAddPathArcI
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipSetPenDashStyle
GdipCreateFromHDC
GdipDrawLineI
GdipCloneImage
imm32
ImmAssociateContext
propsys
InitVariantFromBuffer
comctl32
ord410
ord412
ord413
ImageList_Destroy
ord17
_TrackMouseEvent
InitCommonControlsEx
ImageList_DrawEx
msimg32
AlphaBlend
GradientFill
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
crypt32
CertGetNameStringW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 365KB - Virtual size: 365KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ