Static task
static1
Behavioral task
behavioral1
Sample
b059eafd703f3769d4cd554e6f5f6209d4fedb9149162f4f477cb547981e2dc5.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b059eafd703f3769d4cd554e6f5f6209d4fedb9149162f4f477cb547981e2dc5.exe
Resource
win10v2004-20230703-en
General
-
Target
b059eafd703f3769d4cd554e6f5f6209d4fedb9149162f4f477cb547981e2dc5
-
Size
748KB
-
MD5
ec0b87b1f2462750a69236fc1555bc1a
-
SHA1
eb023d30f8c37283833c8c86f64605fa853d1641
-
SHA256
b059eafd703f3769d4cd554e6f5f6209d4fedb9149162f4f477cb547981e2dc5
-
SHA512
5a278521457200ebe49fc49f57b059bf94455efccd3600aa0f928a9177327bc74eedafd1f210cdf0daf06ec6e0335d6664860a551bb29a6c3c0e2d41f50274cc
-
SSDEEP
12288:7EMR9n9syuxHdy20NiW6r7pseQHu2eEldP5Bnbn3B6mA7wnncUt:I49n9syutMRNiWGFsB6y5xtt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b059eafd703f3769d4cd554e6f5f6209d4fedb9149162f4f477cb547981e2dc5
Files
-
b059eafd703f3769d4cd554e6f5f6209d4fedb9149162f4f477cb547981e2dc5.exe windows x86
f766422c5d982b5e7aa9d34321c19c49
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp100
??1_Container_base12@std@@QAE@XZ
?_Swap_all@_Container_base12@std@@QAEXAAU12@@Z
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
msvcr100
_XcptFilter
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_exit
_cexit
__wgetmainargs
memset
memcpy
__CxxFrameHandler3
_CxxThrowException
_stricmp
_strnicmp
_amsg_exit
_beginthreadex
_purecall
printf
ftell
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
sprintf_s
memmove
memchr
atoi
??3@YAXPAX@Z
atof
??2@YAPAXI@Z
_wtoi
wcscpy_s
_wcsicmp
wcsstr
_wfopen
wprintf
fwrite
fseek
fclose
??_V@YAXPAX@Z
rand
srand
_time64
fread
mfc100u
ord4356
ord12948
ord7006
ord6243
ord1313
ord11494
ord4511
ord3846
ord7109
ord13382
ord2665
ord3992
ord14067
ord5143
ord3999
ord4416
ord4383
ord4379
ord4413
ord4434
ord4392
ord4421
ord4430
ord4400
ord4404
ord4408
ord4396
ord4425
ord4388
ord1519
ord1512
ord1514
ord1508
ord1501
ord11244
ord11246
ord12724
ord2853
ord8393
ord10045
ord6247
ord10081
ord8112
ord13380
ord10937
ord3397
ord3402
ord11081
ord8277
ord14060
ord14059
ord14132
ord14149
ord14145
ord14147
ord14148
ord14146
ord1296
ord2418
ord7385
ord9333
ord2884
ord2887
ord12610
ord5558
ord6870
ord5468
ord5846
ord970
ord8346
ord7393
ord4792
ord6922
ord6932
ord6931
ord4623
ord4794
ord4645
ord4901
ord8483
ord5115
ord4923
ord4642
ord5809
ord13388
ord3749
ord7901
ord2617
ord3436
ord8266
ord3258
ord5830
ord8497
ord422
ord980
ord3628
ord5652
ord1266
ord849
ord11209
ord11240
ord7391
ord11228
ord5261
ord3416
ord4355
ord880
ord6140
ord890
ord12753
ord13568
ord13571
ord13569
ord13572
ord13567
ord13570
ord7179
ord11469
ord13267
ord10976
ord14162
ord1739
ord7126
ord11864
ord3625
ord3684
ord8530
ord13387
ord7108
ord13381
ord11477
ord11476
ord2164
ord9447
ord4744
ord13854
ord7176
ord4086
ord11784
ord11845
ord9498
ord11236
ord7548
ord1292
ord6869
ord7624
ord9328
ord5118
ord2030
ord1440
ord4512
ord1310
ord1312
ord1476
ord11683
ord2629
ord285
ord5264
ord4810
ord12015
ord12351
ord13305
ord3261
ord5802
ord2746
ord3746
ord917
ord8264
ord3260
ord7929
ord7932
ord12951
ord7973
ord11940
ord13047
ord2407
ord1905
ord4359
ord1934
ord343
ord3675
ord1945
ord8550
ord296
ord6080
ord5801
ord5862
ord2185
ord3446
ord5855
ord2756
ord2980
ord2981
ord3627
ord9525
ord10412
ord10058
ord8179
ord948
ord8347
ord2417
ord12606
ord5556
ord11123
ord950
ord788
ord1212
ord1987
ord6346
ord2089
ord1895
ord12186
ord385
ord11164
ord1734
ord13342
ord1282
ord1479
ord7618
ord4802
ord7512
ord3978
ord7911
ord3380
ord3371
ord5900
ord3482
ord2188
ord13181
ord3754
ord7903
ord6117
ord2844
ord3763
ord921
ord8273
ord8372
ord6713
ord4290
ord286
ord902
ord897
ord4360
ord11159
ord2852
ord2951
ord2952
ord3491
ord11116
ord2339
ord7005
ord5276
ord12557
ord10725
ord11210
ord6156
ord2748
kernel32
GetLocalTime
GetTickCount
GlobalFree
GlobalUnlock
SizeofResource
GlobalAlloc
GlobalLock
LoadResource
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
SetUnhandledExceptionFilter
DecodePointer
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
CreatePipe
Sleep
CreateIoCompletionPort
WaitForMultipleObjects
GetSystemInfo
PostQueuedCompletionStatus
GetQueuedCompletionStatus
CreateEventW
ResetEvent
SetEvent
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
ReadFile
GetFileAttributesW
CreateDirectoryW
MultiByteToWideChar
CloseHandle
GetLastError
GetModuleFileNameW
TerminateProcess
WriteFile
WaitForSingleObject
QueryPerformanceCounter
GetCurrentProcess
CreateProcessW
lstrcpyW
GetWindowsDirectoryW
WinExec
lstrcatW
lstrlenW
LoadLibraryW
WideCharToMultiByte
FreeLibrary
GetUserDefaultUILanguage
FindResourceW
user32
PostMessageW
EnableWindow
SetCursor
SetCapture
LoadCursorW
MessageBeep
GetDC
InflateRect
CopyIcon
ReleaseDC
SetWindowLongW
RedrawWindow
GetSysColor
ReleaseCapture
GetSystemMenu
SetForegroundWindow
DrawIcon
LoadMenuW
AppendMenuW
SetWindowPos
GetCursorPos
IsWindow
GetSystemMetrics
IsWindowVisible
SetTimer
KillTimer
GetWindowRect
IsIconic
GetMenuItemID
GetSubMenu
ModifyMenuW
GetMenu
LoadIconW
BringWindowToTop
DrawMenuBar
GetMenuItemCount
RemoveMenu
SendMessageW
FillRect
DrawTextW
GetClientRect
PtInRect
wsprintfW
OffsetRect
InvalidateRect
EqualRect
GetParent
gdi32
SetBkMode
DeleteObject
SelectObject
SetTextColor
EndPath
CreateFontW
StrokeAndFillPath
CreatePen
CreateSolidBrush
Ellipse
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
GetTextExtentPoint32W
CreateFontIndirectW
GetObjectW
GetStockObject
BeginPath
MoveToEx
BitBlt
LineTo
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueW
shell32
Shell_NotifyIconW
ShellExecuteW
comctl32
InitCommonControlsEx
ole32
CreateStreamOnHGlobal
gdiplus
GdipGetImageWidth
GdipImageRotateFlip
GdipCloneImage
GdipFillRectangleI
GdipCreateFromHDC
GdipDisposeImage
GdipAlloc
GdipSetSmoothingMode
GdipDrawImageRectI
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipDrawImageRectRectI
GdipGetImageHeight
GdipCreateTextureIA
GdipCloneBrush
GdipFree
GdipDeleteBrush
GdiplusShutdown
GdiplusStartup
ws2_32
WSACleanup
WSAStartup
accept
listen
send
closesocket
socket
bind
recv
htons
WSAGetLastError
htonl
inet_addr
connect
Sections
.text Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 510KB - Virtual size: 509KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ