Static task
static1
Behavioral task
behavioral1
Sample
d4040c3e2b6a5905be5aec98f02b59cd590296d4eefbdcbb7fcb1972ce493598.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d4040c3e2b6a5905be5aec98f02b59cd590296d4eefbdcbb7fcb1972ce493598.exe
Resource
win10v2004-20230703-en
General
-
Target
d4040c3e2b6a5905be5aec98f02b59cd590296d4eefbdcbb7fcb1972ce493598
-
Size
1.8MB
-
MD5
2da1942c190e9e84b5c28953cf540ce5
-
SHA1
223dda5b3425ffeafd3d621569b378d2aefa5249
-
SHA256
d4040c3e2b6a5905be5aec98f02b59cd590296d4eefbdcbb7fcb1972ce493598
-
SHA512
e24bbdf725d20481cf0d4156fea72dbdca3bf2c17373dc74109755d99836bb5e0ec8cd51dec2717cb657ee35633964ab256aa5e90ffa4f69190765e7de7ffd5e
-
SSDEEP
24576:qCaOhl+YZ38plbAKcxg7292jzBio6TZgVYOR1aqqxJJAmOfXY:qCaOL18plbAKl7+9giOR1UjAm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4040c3e2b6a5905be5aec98f02b59cd590296d4eefbdcbb7fcb1972ce493598
Files
-
d4040c3e2b6a5905be5aec98f02b59cd590296d4eefbdcbb7fcb1972ce493598.exe windows x86
fa0c79e93305690aac54b60dbea712ec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExW
FindFirstFileExW
CreateDirectoryW
FreeLibrary
DuplicateHandle
DeviceIoControl
GetDriveTypeW
GetLogicalDriveStringsW
SetLastError
HeapSize
HeapReAlloc
HeapDestroy
DecodePointer
FindResourceExW
InitializeCriticalSectionAndSpinCount
RaiseException
WritePrivateProfileStringA
WritePrivateProfileStringW
LockResource
SizeofResource
FreeResource
LoadResource
SetEndOfFile
WriteConsoleW
SetStdHandle
FindResourceW
GetEnvironmentStringsW
QueryPerformanceCounter
ReadConsoleW
SetFilePointerEx
FlushFileBuffers
GetFileType
GetConsoleMode
GetConsoleCP
UnregisterWaitEx
InitializeSListHead
ReleaseSemaphore
GetTickCount
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetVolumeInformationW
GetDiskFreeSpaceExW
GetCurrentProcess
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalAlloc
GlobalUnlock
GlobalLock
GetLocalTime
CreateMutexW
GetVersionExW
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryW
GetWindowsDirectoryW
K32GetModuleFileNameExW
K32EnumProcessModules
Process32NextW
Process32FirstW
GetStartupInfoW
Sleep
GetProcAddress
GetModuleHandleW
TerminateProcess
OpenProcess
CreateProcessW
GetStdHandle
GetExitCodeProcess
SetFilePointer
WriteFile
ReadFile
GetModuleFileNameW
RemoveDirectoryW
FindClose
DeleteFileW
FindNextFileW
FindFirstFileW
MoveFileExW
GetFileSize
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
GetOEMCP
IsValidCodePage
GetModuleHandleExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CreateSemaphoreW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetCommandLineW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
CreateTimerQueue
RtlUnwind
IsProcessorFeaturePresent
IsDebuggerPresent
CreateToolhelp32Snapshot
GetFileSizeEx
CreateFileW
SetEvent
CloseHandle
TerminateThread
WaitForSingleObject
CreateEventW
FreeEnvironmentStringsW
GetLastError
GetCurrentThread
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
GetACP
ExitProcess
MulDiv
GetUserDefaultUILanguage
GetCurrentProcessId
CreateThread
ExitThread
LoadLibraryExW
user32
MonitorFromWindow
GetMonitorInfoW
EnableWindow
KillTimer
CreateWindowExW
GetWindowLongW
ShowWindow
SetForegroundWindow
SetTimer
GetWindowRect
IsIconic
MoveWindow
PostMessageW
DefWindowProcW
BringWindowToTop
SetWindowPos
PtInRect
GetCursorPos
ReleaseDC
GetDC
SendMessageW
SetWindowRgn
LoadCursorW
EndPaint
BeginPaint
LoadBitmapW
GetParent
DrawTextW
GetClientRect
GetPropW
SetPropW
FindWindowExW
RegisterClassW
wsprintfW
SetWindowTextW
PostQuitMessage
CloseWindow
wvsprintfW
SetCursor
UnionRect
OffsetRect
GetMessageW
TranslateMessage
DispatchMessageW
CallWindowProcW
RegisterClassExW
GetClassInfoExW
IsWindow
SetFocus
GetWindow
IsWindowVisible
CharNextW
GetActiveWindow
GetFocus
GetKeyState
SetCapture
ReleaseCapture
GetUpdateRect
InvalidateRect
ScreenToClient
MapWindowPoints
IntersectRect
IsRectEmpty
IsZoomed
SetWindowLongW
GetWindowTextW
GetWindowTextLengthW
GetCaretBlinkTime
GetCaretPos
CharPrevW
FillRect
SetRect
CreateCaret
HideCaret
ShowCaret
SetCaretPos
ClientToScreen
GetSysColor
CreateAcceleratorTableW
InvalidateRgn
GetGUIThreadInfo
MessageBoxW
DestroyWindow
gdi32
TextOutW
ExtTextOutW
GdiFlush
MoveToEx
CreateDIBSection
CreateSolidBrush
SetBkMode
SetTextColor
CreateFontW
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
GetObjectW
DeleteDC
GetDeviceCaps
SetStretchBltMode
CreateFontIndirectW
CreatePen
Rectangle
RestoreDC
SaveDC
GetTextMetricsW
SetWindowOrgEx
CreateRoundRectRgn
GetObjectA
CreatePatternBrush
CombineRgn
CreatePenIndirect
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
GetTextExtentPoint32W
LineTo
RoundRect
SelectClipRgn
ExtSelectClipRgn
SetBkColor
StretchBlt
advapi32
RegOpenKeyW
RegCloseKey
OpenProcessToken
RegDeleteValueW
DuplicateTokenEx
RegCreateKeyW
RegQueryValueExW
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
ord165
ole32
CreateStreamOnHGlobal
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantClear
SysAllocString
VariantInit
SysFreeString
shlwapi
PathFileExistsW
PathIsRootW
StrStrIA
ws2_32
closesocket
shutdown
recv
WSAStartup
ntohs
inet_addr
gethostbyname
send
connect
setsockopt
socket
wininet
InternetCloseHandle
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpSendRequestExW
HttpEndRequestW
HttpQueryInfoW
InternetReadFile
HttpSendRequestW
iphlpapi
GetAdaptersInfo
comctl32
_TrackMouseEvent
ord17
imm32
ImmGetVirtualKey
ImmGetContext
ImmReleaseContext
ImmSetCompositionFontW
ImmSetCompositionWindow
gdiplus
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipCloneBrush
GdipDeleteBrush
GdipCreateLineBrushI
GdipCloneImage
GdipDisposeImage
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetCompositingQuality
GdipSetSmoothingMode
GdipSetPixelOffsetMode
GdipSetTextRenderingHint
GdipSetInterpolationMode
GdipGraphicsClear
GdipDrawImage
GdipDrawImageRectI
GdipDeleteFontFamily
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipGetFamily
GdipDrawString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipLoadImageFromStream
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
Sections
.text Size: 872KB - Virtual size: 872KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 233KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ