Static task
static1
Behavioral task
behavioral1
Sample
79428f49950161cb34903cf19e0af1229df86b901751f83bfda4412b3c4a8393.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
79428f49950161cb34903cf19e0af1229df86b901751f83bfda4412b3c4a8393.exe
Resource
win10v2004-20230703-en
General
-
Target
79428f49950161cb34903cf19e0af1229df86b901751f83bfda4412b3c4a8393
-
Size
772KB
-
MD5
f0199c75234875ab1437f3c394541a52
-
SHA1
07bb23f747ea0eea2dd2ba9d759301906287c897
-
SHA256
79428f49950161cb34903cf19e0af1229df86b901751f83bfda4412b3c4a8393
-
SHA512
1ba4bc5e7e34b5bb9ffa619515628c37c9a02930d6fef0c7ac5655bbf2151ef4a537e5597f30c0f650539c56b7c62de42e163b2580b41a4026a4b913771c40e9
-
SSDEEP
24576:e5B2Q0sfWu/0p/piTKSO4nXh2755DpidXWbF/7832Lyk+BskQXLfKKDDnTSC92Uc:e5B2Q0s//0p/ITKSO4nXh2755DpidXWY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79428f49950161cb34903cf19e0af1229df86b901751f83bfda4412b3c4a8393
Files
-
79428f49950161cb34903cf19e0af1229df86b901751f83bfda4412b3c4a8393.exe windows x86
fcedf5097a3603f91216346d52f97438
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
GetCurrentProcess
ReadFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetFileAttributesA
RtlUnwind
RaiseException
HeapFree
HeapAlloc
HeapReAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
GetOEMCP
HeapSize
GetACP
GetTimeZoneInformation
SetUnhandledExceptionFilter
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
GetLocaleInfoW
SetEnvironmentVariableA
GetCPInfo
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcpynA
GetLastError
MulDiv
SetLastError
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LocalFree
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSection
EnterCriticalSection
RemoveDirectoryA
lstrcpyA
MultiByteToWideChar
Sleep
lstrlenA
IsBadReadPtr
FreeLibrary
GetProcAddress
LoadLibraryA
GetTickCount
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
GetLocalTime
FileTimeToSystemTime
WriteFile
SetFileTime
CreateDirectoryA
LocalFileTimeToFileTime
CloseHandle
CreateFileA
SystemTimeToFileTime
TerminateProcess
CopyFileA
user32
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
IsDialogMessageA
SetWindowTextA
ShowWindow
ClientToScreen
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
DestroyMenu
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
EnableWindow
LoadIconA
wsprintfA
GetDesktopWindow
DestroyWindow
UnregisterClassA
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetObjectA
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
DeleteObject
SetBkColor
SetTextColor
GetClipBox
GetStockObject
SelectObject
RestoreDC
SaveDC
CreateBitmap
DeleteDC
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
comctl32
ord17
Sections
.text Size: 392KB - Virtual size: 388KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 293KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ