Static task
static1
Behavioral task
behavioral1
Sample
d509d483b12d6c5d7416738f7f6a9dd0456405d98a1a6566922ec960dc6155d1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d509d483b12d6c5d7416738f7f6a9dd0456405d98a1a6566922ec960dc6155d1.exe
Resource
win10v2004-20230703-en
General
-
Target
d509d483b12d6c5d7416738f7f6a9dd0456405d98a1a6566922ec960dc6155d1
-
Size
2.3MB
-
MD5
3bc69018d4de8bac021ff9c8957f64b9
-
SHA1
b8325fc17cb99ead25ba4baeb8b3184512f22e56
-
SHA256
d509d483b12d6c5d7416738f7f6a9dd0456405d98a1a6566922ec960dc6155d1
-
SHA512
b85b628db6b1fb022f5b1359c2c894a56dcb4d2bcfbf1cd41f1fe24a2fc7e0593beb2ea841d7cbf435bb8ac698bcc287ddffb198c6019e279e03ca5cfeb91471
-
SSDEEP
49152:Pi9mxihRq68Rc/HUYex7vcxEYmpSxdFfCJe+hX:ehRqfc/HUYCvcSYmOdFfOec
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d509d483b12d6c5d7416738f7f6a9dd0456405d98a1a6566922ec960dc6155d1
Files
-
d509d483b12d6c5d7416738f7f6a9dd0456405d98a1a6566922ec960dc6155d1.exe windows x86
cc49f36b1a799e580e5be7648e0bc499
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
CreateThread
GetTempPathW
SetFilePointer
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
WriteFile
MulDiv
LocalFree
FormatMessageW
GetWindowsDirectoryW
GetEnvironmentVariableW
DeleteFileW
CopyFileW
MoveFileW
FindClose
FindNextFileW
FindFirstFileW
LoadLibraryW
SetErrorMode
GetProcAddress
FreeLibrary
GetCurrentProcess
GetModuleFileNameW
GetModuleHandleW
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
RtlUnwind
LCMapStringA
LCMapStringW
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
HeapSize
VirtualAlloc
HeapReAlloc
LoadLibraryA
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
lstrcpynW
GetFullPathNameW
GetFileSize
ReadFile
CloseHandle
CreateFileW
GetFileAttributesW
RaiseException
GetSystemDefaultLangID
user32
IsDlgButtonChecked
CheckDlgButton
ShowWindow
SetWindowPos
GetWindowRect
GetDesktopWindow
PostMessageW
SetClassLongW
DestroyMenu
TrackPopupMenu
AppendMenuW
CreatePopupMenu
GetWindowTextW
EndDialog
LoadIconW
DialogBoxParamW
OemToCharBuffA
LoadCursorW
SetCursor
GetSystemMetrics
GetClientRect
GetDlgItemTextW
GetActiveWindow
MessageBoxW
SendMessageW
FindWindowA
GetWindowTextA
SetWindowTextA
GetDC
ReleaseDC
GetDlgItem
GetCursorPos
SetDlgItemTextW
SetWindowTextW
SetDlgItemTextA
gdi32
CreateFontIndirectW
GetDeviceCaps
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
shell32
SHGetSpecialFolderLocation
SHFileOperationW
SHGetMalloc
SHGetDesktopFolder
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
OleUninitialize
CoCreateInstance
OleInitialize
comctl32
ord17
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ