Static task
static1
Behavioral task
behavioral1
Sample
730c75bd881dfd152dea282d4c7a4e0d25b5ba1bb2fcc07cda5742c94c85f3b1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
730c75bd881dfd152dea282d4c7a4e0d25b5ba1bb2fcc07cda5742c94c85f3b1.exe
Resource
win10v2004-20230703-en
General
-
Target
730c75bd881dfd152dea282d4c7a4e0d25b5ba1bb2fcc07cda5742c94c85f3b1
-
Size
361KB
-
MD5
d30b723fab25a406a23f544bbae1af89
-
SHA1
32c1638f4bd7851bc361c7cf12aad5e2668af92e
-
SHA256
730c75bd881dfd152dea282d4c7a4e0d25b5ba1bb2fcc07cda5742c94c85f3b1
-
SHA512
e1c2f5bc4495f92af8f0475e75e65cdb8365b9505bbfcc58019178969f29e59a283550ca6ae88508c84baba399577430bfa6f24b61b38ff3fe2f1f25721ce44e
-
SSDEEP
6144:FcZi7ZI2xw34mNeGk+TmFyg91IHl07r3YjaNxtyPWJhGyLdm8zqZSK:FoYC4mgKTmFyg91sl07DYjaNxtyPSlR8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 730c75bd881dfd152dea282d4c7a4e0d25b5ba1bb2fcc07cda5742c94c85f3b1
Files
-
730c75bd881dfd152dea282d4c7a4e0d25b5ba1bb2fcc07cda5742c94c85f3b1.exe windows x64
a78b1338095407266059560b2ec280c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msi
ord173
kernel32
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringW
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
FlushFileBuffers
GetModuleFileNameW
lstrcmpiW
LoadLibraryExW
InitializeCriticalSectionEx
RaiseException
SetThreadLocale
GetSystemDefaultLCID
lstrlenW
CreateThread
DecodePointer
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
WritePrivateProfileStringW
GetExitCodeThread
WaitForSingleObject
OpenProcess
GetExitCodeProcess
CreateProcessW
GetCommandLineW
AddDllDirectory
CreateEventW
SetEvent
GlobalMemoryStatus
SetEnvironmentVariableW
SetCurrentDirectoryW
GetTimeFormatW
GetDateFormatW
GetUserDefaultLangID
VerifyVersionInfoW
VerSetConditionMask
CompareStringW
IsValidCodePage
FindFirstFileExW
LCMapStringW
FlsFree
DeleteCriticalSection
FlsAlloc
GetFileType
GetCommandLineA
GetStdHandle
GetModuleHandleExW
ExitProcess
RtlUnwind
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlPcToFileHeader
RtlUnwindEx
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
GetACP
IsDebuggerPresent
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
GetFileSizeEx
SetFilePointerEx
GetConsoleOutputCP
Sleep
WriteFile
GetConsoleMode
GetModuleHandleW
WideCharToMultiByte
MultiByteToWideChar
GetEnvironmentVariableW
FlsGetValue
ExpandEnvironmentStringsW
ReadFile
GetFileSize
CreateDirectoryW
DeleteFileW
RemoveDirectoryW
FindNextFileW
SetLastError
GetFullPathNameW
FindFirstFileW
FindClose
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CreateFileW
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
FreeLibrary
GetProcAddress
LoadLibraryW
GetLastError
FlsSetValue
WriteConsoleW
user32
DrawFocusRect
SetCursor
TrackMouseEvent
GetFocus
GetSysColor
IsWindowEnabled
EndPaint
BeginPaint
FillRect
SetFocus
SetCapture
GetCapture
ReleaseCapture
GetCursorPos
ScreenToClient
PtInRect
UpdateWindow
InvalidateRect
SetRectEmpty
GetClassNameW
SetWindowLongW
LoadCursorW
SystemParametersInfoW
CreateWindowExW
GetWindowTextLengthW
GetWindowTextW
GetDC
ReleaseDC
DrawTextW
OffsetRect
IsWindow
CallWindowProcW
DefWindowProcW
GetWindowLongPtrW
SendMessageW
EndDialog
GetWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
EnableWindow
SetWindowTextW
GetDlgItem
SetWindowLongPtrW
DialogBoxParamW
PeekMessageW
GetActiveWindow
GetMessageW
RegisterWindowMessageW
PostThreadMessageW
UnregisterClassW
CharNextW
DestroyWindow
GetDlgCtrlID
gdi32
SetTextColor
GetStockObject
DeleteObject
GetObjectW
CreateFontIndirectW
DeleteDC
SelectObject
SetBkMode
advapi32
CryptReleaseContext
CryptDeriveKey
CryptDestroyKey
CryptHashData
CryptDestroyHash
CryptAcquireContextW
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
SetServiceStatus
CloseServiceHandle
RegCreateKeyExW
RegOpenKeyExW
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
CryptGetHashParam
CryptDecrypt
CryptCreateHash
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
VarUI4FromStr
shlwapi
PathIsUNCW
Sections
.text Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ