Static task
static1
Behavioral task
behavioral1
Sample
272d95a733a1ccf27c8a788b11180b281f5b9bb444c8671fe26e7338d0c80424.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
272d95a733a1ccf27c8a788b11180b281f5b9bb444c8671fe26e7338d0c80424.exe
Resource
win10v2004-20230703-en
General
-
Target
272d95a733a1ccf27c8a788b11180b281f5b9bb444c8671fe26e7338d0c80424
-
Size
1.5MB
-
MD5
4f563941ec38b12d487150de2790b772
-
SHA1
d177f3efcbca1b008d6dfed12198a6823adb5263
-
SHA256
272d95a733a1ccf27c8a788b11180b281f5b9bb444c8671fe26e7338d0c80424
-
SHA512
03ebc7c848f365c9107568d4fdbb9cffcff1b403c2a806d572c7f7ffa9ed6c30b2e6ad5384b554e9443dfb734181a866b7938e3d541ed270c4d5a457fc2897fa
-
SSDEEP
24576:8wU18CppgJeF4DLc/Jx45iKEZ2ZQGyWUN5IeYtnm:2pgJeFOLkJesKPZLFK9wm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 272d95a733a1ccf27c8a788b11180b281f5b9bb444c8671fe26e7338d0c80424
Files
-
272d95a733a1ccf27c8a788b11180b281f5b9bb444c8671fe26e7338d0c80424.exe windows x86
7b77914faeb130ab36f0c5046d3c2c88
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dxwnd
ord7
ord14
ord8
ord3
ord11
ord9
ord2
ord1
ord12
ord6
ord13
ord5
ord4
shlwapi
PathFindExtensionA
PathFindFileNameA
PathRemoveFileSpecW
PathStripToRootA
PathIsUNCA
PathRemoveFileSpecA
kernel32
MoveFileA
GetStringTypeExA
GetThreadLocale
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
FileTimeToSystemTime
SystemTimeToFileTime
GlobalFlags
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
GetModuleHandleW
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetFileSizeEx
SetErrorMode
RtlUnwind
RaiseException
ExitProcess
GetDiskFreeSpaceA
HeapAlloc
GetSystemTimeAsFileTime
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCommandLineA
GetStartupInfoA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapSize
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
SetEnvironmentVariableW
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
GetProcessHeap
GetTempFileNameA
GetFileTime
SetFileTime
InterlockedDecrement
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetCurrentProcessId
GlobalSize
FormatMessageA
lstrlenW
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetFileAttributesA
EnumSystemCodePagesA
GetCPInfoExA
GetVersion
SetFilePointer
FreeResource
GlobalFree
MulDiv
SetEvent
ResetEvent
CreateSemaphoreA
CreateEventA
OpenEventA
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
GetThreadContext
FindNextFileA
GetEnvironmentVariableA
SetEnvironmentVariableA
WaitForSingleObject
WaitForDebugEvent
GetFullPathNameA
ReadProcessMemory
ContinueDebugEvent
DebugSetProcessKillOnExit
DebugActiveProcessStop
GetFileSize
CreateFileMappingA
MapViewOfFile
GetLogicalDriveStringsA
QueryDosDeviceA
UnmapViewOfFile
FindFirstFileA
FindClose
lstrlenA
MultiByteToWideChar
lstrcpyA
CreateMailslotA
GetTempPathA
FreeLibrary
TerminateProcess
lstrcmpiA
GetShortPathNameA
GetLongPathNameA
CopyFileA
SetLastError
DeleteFileA
CreateThread
GlobalAlloc
GlobalLock
GlobalUnlock
GetTickCount
ReadFile
Thread32First
OpenThread
ResumeThread
SuspendThread
Thread32Next
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
Sleep
OpenSemaphoreA
GetDriveTypeA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetUserDefaultUILanguage
CreateFileA
WriteFile
LocalAlloc
LocalFree
GetCurrentProcess
GetVersionExA
GetLastError
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetModuleHandleA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetModuleFileNameA
LoadLibraryA
GetProcAddress
CloseHandle
HeapReAlloc
user32
BeginPaint
EndPaint
PostQuitMessage
ValidateRect
TranslateMessage
ShowOwnedPopups
InflateRect
GetMenuItemInfoA
CharUpperA
IsClipboardFormatAvailable
GetSysColorBrush
CharNextA
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
TranslateAcceleratorA
SetWindowContextHelpId
MapDialogRect
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
IntersectRect
IsIconic
GetWindowPlacement
GetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
EndDialog
LoadStringA
SetCursor
ShowCursor
GetMessageA
WindowFromPoint
OffsetRect
ReleaseCapture
SetCapture
GetWindowDC
RegisterWindowMessageA
DrawAnimatedRects
EnumChildWindows
GetClassNameA
TrackPopupMenu
SetMenuDefaultItem
IsWindow
SetForegroundWindow
SetParent
SetActiveWindow
RedrawWindow
GetMenuItemID
SetSystemCursor
LoadCursorA
CopyIcon
DestroyCursor
GetKeyState
GetIconInfo
SetRect
CopyRect
FillRect
GetCursorPos
WindowFromDC
LoadStringW
MessageBoxExW
GetSystemMetrics
AdjustWindowRect
ReleaseDC
MessageBeep
EnumWindows
GetWindowThreadProcessId
GetWindow
GetClipboardData
DestroyMenu
LoadImageA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
ClipCursor
UnregisterHotKey
RegisterHotKey
GetAncestor
ClientToScreen
LoadMenuA
GetSubMenu
GetMenuState
EnableMenuItem
CheckMenuItem
LoadBitmapA
SetSysColors
PostMessageA
EnumDisplaySettingsA
ChangeDisplaySettingsA
GetSysColor
UpdateWindow
GetClientRect
GetParent
GetDC
GetDesktopWindow
SetMenu
GetMenu
SystemParametersInfoA
InvalidateRect
GetWindowRect
FindWindowA
MonitorFromWindow
IsWindowVisible
LoadIconA
DestroyIcon
SendMessageA
EnableWindow
KillTimer
SetTimer
MessageBoxExA
MessageBoxA
GetNextDlgTabItem
gdi32
CreatePatternBrush
SelectPalette
CreateFontIndirectA
GetTextExtentPoint32A
GetMapMode
OffsetViewportOrgEx
GetBkColor
GetTextColor
GetRgnBox
ExtSelectClipRgn
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
CreateCompatibleBitmap
DeleteDC
SelectObject
BitBlt
GetPixel
SetDeviceGammaRamp
GetDeviceGammaRamp
DeleteObject
SetDIBitsToDevice
StretchDIBits
CreatePalette
GetDeviceCaps
GetPixelFormat
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DescribePixelFormat
MoveToEx
LineTo
SetMapMode
SetStretchBltMode
SetBkMode
RestoreDC
SaveDC
CopyMetaFileA
CreateRectRgnIndirect
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
Ellipse
CreatePen
GetStockObject
Rectangle
GetBitmapBits
GetObjectA
CreateSolidBrush
CreateCompatibleDC
SetViewportExtEx
comdlg32
ChooseColorA
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
OpenProcessToken
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegSetValueA
RegCloseKey
GetTokenInformation
DuplicateToken
CreateWellKnownSid
CheckTokenMembership
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
shell32
SHGetFileInfoA
DragQueryPoint
SHAppBarMessage
Shell_NotifyIconA
ExtractIconA
SHChangeNotify
DragAcceptFiles
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
ShellExecuteExA
DragQueryFileA
DragFinish
comctl32
ImageList_Create
oledlg
ord8
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
CLSIDFromString
CLSIDFromProgID
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
OleGetClipboard
CreateStreamOnHGlobal
GetHGlobalFromStream
CoTaskMemFree
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
oleaut32
SafeArrayDestroy
SysAllocString
OleCreateFontIndirect
OleLoadPicture
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
OleCreatePictureIndirect
VarDateFromStr
SysAllocStringByteLen
SysFreeString
SysStringLen
Sections
.text Size: 481KB - Virtual size: 481KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 898KB - Virtual size: 898KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ