Static task
static1
Behavioral task
behavioral1
Sample
13b5b41360ea62e6678ff9e574bdacd7183b63cdf6b06d2689ea7ec5a637c55a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
13b5b41360ea62e6678ff9e574bdacd7183b63cdf6b06d2689ea7ec5a637c55a.exe
Resource
win10v2004-20230703-en
General
-
Target
13b5b41360ea62e6678ff9e574bdacd7183b63cdf6b06d2689ea7ec5a637c55a
-
Size
630KB
-
MD5
ade780b7d597ca249b2bbccf986014eb
-
SHA1
149b582a09f6804157d99cd4c7337b29035df092
-
SHA256
13b5b41360ea62e6678ff9e574bdacd7183b63cdf6b06d2689ea7ec5a637c55a
-
SHA512
a09bdccbaa9e5bb3a0305cc48bbfc027df524d1026eff5d2728d824977160b021b3ec723eb1434e3c740e038a52dd69a8ed5b45ad0d1f64f5d69a605b7dd3853
-
SSDEEP
12288:pNm+OGv6iXN1Qr43z3oimM6/H2L7JML0llwYx0MZapENi8hBy:Pm+8enQrU8i/s2L7JhHZx0fw/zy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13b5b41360ea62e6678ff9e574bdacd7183b63cdf6b06d2689ea7ec5a637c55a
Files
-
13b5b41360ea62e6678ff9e574bdacd7183b63cdf6b06d2689ea7ec5a637c55a.exe windows x86
cc49f36b1a799e580e5be7648e0bc499
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
CreateThread
GetTempPathW
SetFilePointer
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
WriteFile
MulDiv
LocalFree
FormatMessageW
GetWindowsDirectoryW
GetEnvironmentVariableW
DeleteFileW
CopyFileW
MoveFileW
FindClose
FindNextFileW
FindFirstFileW
LoadLibraryW
SetErrorMode
GetProcAddress
FreeLibrary
GetCurrentProcess
GetModuleFileNameW
GetModuleHandleW
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
RtlUnwind
LCMapStringA
LCMapStringW
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
HeapSize
VirtualAlloc
HeapReAlloc
LoadLibraryA
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
lstrcpynW
GetFullPathNameW
GetFileSize
ReadFile
CloseHandle
CreateFileW
GetFileAttributesW
RaiseException
GetSystemDefaultLangID
user32
IsDlgButtonChecked
CheckDlgButton
ShowWindow
SetWindowPos
GetWindowRect
GetDesktopWindow
PostMessageW
SetClassLongW
DestroyMenu
TrackPopupMenu
AppendMenuW
CreatePopupMenu
GetWindowTextW
EndDialog
LoadIconW
DialogBoxParamW
OemToCharBuffA
LoadCursorW
SetCursor
GetSystemMetrics
GetClientRect
GetDlgItemTextW
GetActiveWindow
MessageBoxW
SendMessageW
FindWindowA
GetWindowTextA
SetWindowTextA
GetDC
ReleaseDC
GetDlgItem
GetCursorPos
SetDlgItemTextW
SetWindowTextW
SetDlgItemTextA
gdi32
CreateFontIndirectW
GetDeviceCaps
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
shell32
SHGetSpecialFolderLocation
SHFileOperationW
SHGetMalloc
SHGetDesktopFolder
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
OleUninitialize
CoCreateInstance
OleInitialize
comctl32
ord17
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ