Static task
static1
Behavioral task
behavioral1
Sample
c48efbed3ed913a6f579695777a38df2f4c033409a456edef681af4daa1235ee.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c48efbed3ed913a6f579695777a38df2f4c033409a456edef681af4daa1235ee.exe
Resource
win10v2004-20230703-en
General
-
Target
c48efbed3ed913a6f579695777a38df2f4c033409a456edef681af4daa1235ee
-
Size
1.5MB
-
MD5
5ff4ec8768c83955f39abf1533062b33
-
SHA1
c2d74a2247a439d1bc353ce26a9f2f7186383d45
-
SHA256
c48efbed3ed913a6f579695777a38df2f4c033409a456edef681af4daa1235ee
-
SHA512
c1c8696e8fe56645b9e9140b375c0d89a89f8306566ab8d1e2648e4d2129236dcb18e0e3434c0d847410104b1c5fd5671d4026c66a7e333a05d8c5453a8f12c5
-
SSDEEP
24576:NbDYaoAM4jBL+I+xgYfD5yzGyWUN5IeYUz:KAM4jBL+BxggD7FK9x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c48efbed3ed913a6f579695777a38df2f4c033409a456edef681af4daa1235ee
Files
-
c48efbed3ed913a6f579695777a38df2f4c033409a456edef681af4daa1235ee.exe windows x86
bec4005b509c65bc8495568ccd3194d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dxwnd
ord7
ord14
ord8
ord3
ord11
ord9
ord2
ord1
ord12
ord6
ord13
ord5
ord4
shlwapi
PathFindExtensionA
PathFindFileNameA
PathRemoveFileSpecW
PathStripToRootA
PathIsUNCA
PathRemoveFileSpecA
kernel32
GetThreadLocale
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GlobalFlags
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
GetModuleHandleW
FileTimeToSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetFileSizeEx
SetErrorMode
RtlUnwind
RaiseException
ExitProcess
HeapReAlloc
GetStringTypeExA
GetSystemTimeAsFileTime
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCommandLineA
GetStartupInfoA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapSize
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
SetEnvironmentVariableW
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
GetProcessHeap
MoveFileA
GetDiskFreeSpaceA
GetTempFileNameA
GetFileTime
SetFileTime
InterlockedDecrement
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetCurrentProcessId
GlobalSize
FormatMessageA
lstrlenW
lstrlenA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetFileAttributesA
EnumSystemCodePagesA
GetCPInfoExA
GetVersion
SetFilePointer
FreeResource
GlobalUnlock
GlobalFree
MulDiv
GlobalAlloc
SetEvent
ResetEvent
CreateSemaphoreA
Process32First
Process32Next
CreateEventA
OpenEventA
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
GetThreadContext
FindNextFileA
GetEnvironmentVariableA
SetEnvironmentVariableA
WaitForSingleObject
WaitForDebugEvent
GetFullPathNameA
ReadProcessMemory
ContinueDebugEvent
DebugSetProcessKillOnExit
DebugActiveProcessStop
MultiByteToWideChar
GetFileSize
CreateFileMappingA
MapViewOfFile
GetLogicalDriveStringsA
QueryDosDeviceA
UnmapViewOfFile
FreeLibrary
FindFirstFileA
FindClose
GlobalLock
CreateMailslotA
GetTempPathA
OpenProcess
TerminateProcess
lstrcmpiA
GetShortPathNameA
GetLongPathNameA
CopyFileA
SetLastError
DeleteFileA
CreateThread
GetTickCount
ReadFile
Sleep
CreateToolhelp32Snapshot
Thread32First
OpenThread
ResumeThread
SuspendThread
Thread32Next
CreateProcessA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetPrivateProfileStringA
GetUserDefaultUILanguage
CreateFileA
WriteFile
LocalAlloc
LocalFree
GetCurrentProcess
GetVersionExA
GetLastError
WritePrivateProfileStringA
GetPrivateProfileIntA
GetModuleHandleA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetModuleFileNameA
LoadLibraryA
GetProcAddress
CloseHandle
HeapAlloc
user32
ShowOwnedPopups
InflateRect
GetMenuItemInfoA
CharUpperA
IsClipboardFormatAvailable
GetSysColorBrush
CharNextA
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
TranslateMessage
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
TranslateAcceleratorA
SetWindowContextHelpId
MapDialogRect
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
IntersectRect
IsIconic
GetWindowPlacement
GetActiveWindow
CreateDialogIndirectParamA
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
LoadStringA
LoadCursorA
SetCursor
ShowCursor
GetMessageA
WindowFromPoint
OffsetRect
ReleaseCapture
SetCapture
GetWindowDC
RegisterWindowMessageA
DrawAnimatedRects
EnumChildWindows
GetClassNameA
TrackPopupMenu
SetMenuDefaultItem
IsWindow
SetForegroundWindow
SetParent
SetActiveWindow
RedrawWindow
GetMenuItemID
GetKeyState
MessageBeep
GetIconInfo
SetRect
CopyRect
FillRect
GetCursorPos
WindowFromDC
LoadStringW
MessageBoxExW
GetSystemMetrics
AdjustWindowRect
ReleaseDC
EnumWindows
GetWindowThreadProcessId
GetWindow
IsWindowVisible
DestroyMenu
LoadImageA
ClipCursor
UnregisterHotKey
RegisterHotKey
GetAncestor
ClientToScreen
LoadMenuA
GetSubMenu
GetMenuState
EnableMenuItem
CheckMenuItem
LoadBitmapA
SetSysColors
PostMessageA
EnumDisplaySettingsA
ChangeDisplaySettingsA
GetSysColor
UpdateWindow
GetParent
GetClientRect
GetDC
GetDesktopWindow
SetMenu
GetMenu
SystemParametersInfoA
FindWindowA
InvalidateRect
GetWindowRect
LoadIconA
DestroyIcon
SendMessageA
EnableWindow
KillTimer
SetTimer
MessageBoxExA
MessageBoxA
DestroyWindow
gdi32
ExtSelectClipRgn
CreatePatternBrush
SelectPalette
GetTextExtentPoint32A
GetMapMode
ExtTextOutA
GetTextColor
GetRgnBox
CreateFontIndirectA
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
CreateCompatibleBitmap
DeleteDC
SelectObject
BitBlt
GetPixel
SetDeviceGammaRamp
GetDeviceGammaRamp
DeleteObject
SetDIBitsToDevice
StretchDIBits
CreatePalette
GetDeviceCaps
GetPixelFormat
GetWindowExtEx
GetViewportExtEx
GetBkColor
DescribePixelFormat
MoveToEx
LineTo
SetMapMode
SetStretchBltMode
SetBkMode
RestoreDC
SaveDC
CopyMetaFileA
CreateRectRgnIndirect
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
Ellipse
CreatePen
GetStockObject
Rectangle
GetBitmapBits
GetObjectA
CreateSolidBrush
CreateCompatibleDC
Escape
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
OpenProcessToken
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegSetValueA
RegCloseKey
GetTokenInformation
DuplicateToken
CreateWellKnownSid
CheckTokenMembership
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
shell32
SHGetFileInfoA
DragQueryPoint
SHAppBarMessage
SHChangeNotify
DragAcceptFiles
Shell_NotifyIconA
ExtractIconA
ShellExecuteA
ShellExecuteExA
DragQueryFileA
DragFinish
comctl32
ImageList_Create
oledlg
ord8
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
CLSIDFromString
CLSIDFromProgID
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
OleGetClipboard
CoTaskMemFree
CreateStreamOnHGlobal
GetHGlobalFromStream
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
oleaut32
SysAllocString
OleCreateFontIndirect
OleLoadPicture
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantClear
SafeArrayDestroy
VariantCopy
OleCreatePictureIndirect
SysAllocStringByteLen
SysFreeString
SysStringLen
SysAllocStringLen
VariantInit
VariantChangeType
Sections
.text Size: 461KB - Virtual size: 461KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 894KB - Virtual size: 894KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ