Static task
static1
Behavioral task
behavioral1
Sample
notepad.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
notepad.exe
Resource
win10v2004-20230703-en
General
-
Target
notepad.exe
-
Size
237KB
-
MD5
3b508cae5debcba928b5bc355517e2e6
-
SHA1
40f2e778cf1effa957c719d2398e641eff20e613
-
SHA256
da0acee8f60a460cfb5249e262d3d53211ebc4c777579e99c8202b761541110a
-
SHA512
5f5a3b5e64b4a149865f65d678028cef3bc0de16ef265c130b985494ab6690193f8f5e065c6e57d723beb208411aca6debd4afb55a64ce06f3326a76b9469145
-
SSDEEP
3072:I9icXWs8CmX+e059nAK/WDXa3ZKvvkro5P3fL/JLgf7nDVF6PUp1Yo3ICgY:gonX+x9nAs4q3KUIT/5gfzDVlVXg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource notepad.exe
Files
-
notepad.exe.exe windows x64
968239be2020f1c0daffdcdbd49e9c82
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
OpenProcessToken
GetTokenInformation
DuplicateEncryptionInfoFile
RegSetValueExW
RegQueryValueExW
RegCreateKeyW
RegCloseKey
RegOpenKeyExW
EventSetInformation
EventRegister
EventUnregister
EventWriteTransfer
IsTextUnicode
kernel32
MultiByteToWideChar
LocalReAlloc
UnmapViewOfFile
LocalSize
GetStartupInfoW
lstrcmpW
GlobalAlloc
GlobalLock
GlobalUnlock
CreateFileMappingW
GetFileInformationByHandle
GetFileAttributesExW
GetFullPathNameW
FindFirstFileW
SetEndOfFile
DeleteFileW
GetACP
GetLastError
GetFileAttributesW
WriteFile
SetLastError
WideCharToMultiByte
GetTimeFormatW
GetDateFormatW
GetLocalTime
GetUserDefaultUILanguage
FoldStringW
LocalUnlock
LocalLock
FormatMessageW
FindClose
FindNLSString
GetCurrentProcessId
HeapSetInformation
GetCommandLineW
LocalFree
lstrcmpiW
GetCurrentProcess
MulDiv
GetLocaleInfoW
GlobalFree
LocalAlloc
CloseHandle
ReadFile
CreateFileW
SetErrorMode
MapViewOfFile
gdi32
GetTextFaceW
CreateDCW
StartPage
StartDocW
SetAbortProc
DeleteDC
EndDoc
AbortDoc
EndPage
GetTextMetricsW
SetBkMode
LPtoDP
SetWindowExtEx
SetViewportExtEx
SetMapMode
GetTextExtentPoint32W
TextOutW
EnumFontsW
SelectObject
DeleteObject
CreateFontIndirectW
GetDeviceCaps
user32
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
UnhookWinEvent
SetWindowTextW
GetMenuState
OpenClipboard
IsClipboardFormatAvailable
CloseClipboard
SetDlgItemTextW
GetDlgItemTextW
EndDialog
SendDlgItemMessageW
WinHelpW
GetCursorPos
ScreenToClient
ChildWindowFromPoint
GetParent
SetScrollPos
IsDialogMessageW
UpdateWindow
GetWindowPlacement
SetWindowPlacement
CharUpperW
GetSystemMenu
LoadAcceleratorsW
SetWindowLongW
RegisterWindowMessageW
LoadCursorW
CreateWindowExW
LoadImageW
RegisterClassExW
GetWindowTextLengthW
GetWindowLongW
PeekMessageW
GetWindowTextW
EnableWindow
CreateDialogParamW
DrawTextExW
GetMessageW
SetWinEventHook
CharNextW
GetKeyboardLayout
SetWindowPos
RedrawWindow
GetDlgCtrlID
GetForegroundWindow
MessageBeep
DestroyWindow
PostQuitMessage
DefWindowProcW
IsIconic
LoadStringW
InvalidateRect
SetActiveWindow
SetCursor
ReleaseDC
GetDC
CheckMenuItem
MessageBoxW
GetFocus
LoadIconW
DialogBoxParamW
SetFocus
GetSubMenu
EnableMenuItem
GetMenu
PostMessageW
SetThreadDpiAwarenessContext
MoveWindow
GetClientRect
SendMessageW
ord2577
ord2704
ord2702
ord2707
ShowWindow
msvcrt
_lock
?terminate@@YAXXZ
_commode
_fmode
_acmdln
memset
memcpy
__C_specific_handler
_initterm
__setusermatherr
_ismbblead
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
iswctype
wcsnlen
_wcsicmp
_wtol
_vsnwprintf
_unlock
__dllonexit
_onexit
_callnewh
malloc
strchr
memcpy_s
_purecall
free
__CxxFrameHandler3
wcscmp
api-ms-win-core-com-l1-1-1
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
PropVariantClear
CoCreateGuid
CoUninitialize
CoCreateFreeThreadedMarshaler
CoWaitForMultipleHandles
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
api-ms-win-core-synch-l1-2-0
ReleaseSemaphore
ReleaseMutex
CreateMutexExW
SetEvent
WaitForSingleObject
Sleep
WaitForSingleObjectEx
CreateSemaphoreExW
OpenSemaphoreW
CreateEventExW
api-ms-win-core-rtlsupport-l1-2-0
RtlLookupFunctionEntry
RtlCaptureContext
RtlVirtualUnwind
api-ms-win-core-errorhandling-l1-1-1
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RaiseException
api-ms-win-core-processthreads-l1-1-2
TerminateProcess
GetCurrentThreadId
api-ms-win-core-libraryloader-l1-2-0
FreeLibrary
GetProcAddress
GetModuleHandleW
GetModuleHandleExW
GetModuleFileNameW
LoadLibraryExW
GetModuleFileNameA
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-2-1
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-core-heap-l1-2-0
HeapFree
GetProcessHeap
HeapAlloc
api-ms-win-core-winrt-string-l1-1-0
WindowsCreateStringReference
WindowsGetStringRawBuffer
WindowsCreateString
WindowsDeleteString
api-ms-win-core-winrt-error-l1-1-1
SetRestrictedErrorInfo
RoGetMatchingRestrictedErrorInfo
api-ms-win-core-string-l1-1-0
CompareStringOrdinal
api-ms-win-core-winrt-l1-1-0
RoGetActivationFactory
api-ms-win-core-debug-l1-1-1
OutputDebugStringW
comctl32
ord345
CreateStatusWindowW
comdlg32
PageSetupDlgW
ChooseFontW
GetFileTitleW
FindTextW
ReplaceTextW
GetSaveFileNameW
GetOpenFileNameW
CommDlgExtendedError
PrintDlgExW
feclient
EfsClientDecryptFile
ntdll
WinSqmAddToStream
propsys
PSGetPropertyDescriptionListFromString
PropVariantToStringVectorAlloc
shell32
SHCreateItemFromParsingName
DragQueryFileW
SHAddToRecentDocs
DragFinish
DragAcceptFiles
ShellAboutW
shlwapi
PathIsFileSpecW
PathFileExistsW
PathIsNetworkPathW
PathFindExtensionW
SHStrDupW
winspool.drv
GetPrinterDriverW
ClosePrinter
OpenPrinterW
urlmon
FindMimeFromData
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 524B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ