Static task
static1
Behavioral task
behavioral1
Sample
0a6a38a176f40b3a44bf2dc58e6e3cbee2b81d8ab87769894f21b474f0c0e10f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0a6a38a176f40b3a44bf2dc58e6e3cbee2b81d8ab87769894f21b474f0c0e10f.exe
Resource
win10v2004-20230703-en
General
-
Target
0a6a38a176f40b3a44bf2dc58e6e3cbee2b81d8ab87769894f21b474f0c0e10f
-
Size
11.5MB
-
MD5
0866bd55b20ce69c2f57ec279bf2767d
-
SHA1
27478854f7316a527dbad893f8e4432b0209d4c7
-
SHA256
0a6a38a176f40b3a44bf2dc58e6e3cbee2b81d8ab87769894f21b474f0c0e10f
-
SHA512
a92c842f2451ae3b5dab37c8d4197b153d4fc6786fb7bd245ac1ddeeb5f1694e2361533a63b3b183564cfb17c82862e9c5a0387408b5079fd6046c0384aadf72
-
SSDEEP
196608:0Gx9TvQ6cR6Ykz1fageis+4Jsv6tWKFdu9CpIaU+HDV:0y97WpiYJsv6tWKFdu9CU+jV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a6a38a176f40b3a44bf2dc58e6e3cbee2b81d8ab87769894f21b474f0c0e10f
Files
-
0a6a38a176f40b3a44bf2dc58e6e3cbee2b81d8ab87769894f21b474f0c0e10f.exe windows x86
62ee56dcc0563ce37f8d9c725ea2893c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
FlushFileBuffers
GetFileType
ReadFile
SetEndOfFile
SetFilePointerEx
WriteFile
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
MoveFileExW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
SetFilePointer
ConnectNamedPipe
CreateNamedPipeW
GetExitCodeProcess
GetProcessId
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
GetModuleHandleExW
GetTimeZoneInformation
GetGeoInfoW
GetUserGeoID
FindFirstFileExW
FindNextFileW
ReadFileEx
PeekNamedPipe
CancelIo
SleepEx
GetModuleHandleA
WriteFileEx
ExitProcess
DisconnectNamedPipe
WaitNamedPipeW
GetOverlappedResult
SetHandleInformation
GetVolumeInformationW
lstrcmpW
GetDriveTypeW
EncodePointer
MoveFileW
RaiseException
RtlUnwind
GetCommandLineA
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
AreFileApisANSI
ExitThread
LoadLibraryExW
EnterCriticalSection
LeaveCriticalSection
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetFileAttributesW
SetStdHandle
HeapSize
SetLastError
GetProcessHeap
DeleteCriticalSection
GetModuleFileNameA
GetSystemTimeAsFileTime
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetEnvironmentVariableA
WriteConsoleW
LCMapStringW
EnumSystemLocalesW
GetStringTypeW
FindFirstChangeNotificationW
FindCloseChangeNotification
VirtualFree
VirtualAlloc
CreateMutexW
ReleaseMutex
InitializeCriticalSection
CopyFileW
DeviceIoControl
GetTempPathW
SetErrorMode
RemoveDirectoryW
GetLongPathNameW
GetLogicalDrives
GetFullPathNameW
GetFileInformationByHandle
GetFileAttributesW
FindFirstFileW
FindClose
CreateDirectoryW
DeleteFileW
GetCurrentDirectoryW
GetFileAttributesExW
CreateFileW
GetModuleFileNameW
GetStartupInfoW
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
GetUserDefaultUILanguage
GetCurrencyFormatW
GetTimeFormatW
GetDateFormatW
ResetEvent
LoadLibraryW
GetSystemDirectoryW
WaitForSingleObjectEx
GetConsoleWindow
OutputDebugStringW
WaitForMultipleObjects
GetSystemInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
ResumeThread
TerminateThread
GetThreadPriority
SetThreadPriority
GetCurrentThread
CreateThread
SwitchToThread
Sleep
FindNextChangeNotification
CreateEventW
WaitForSingleObject
SetEvent
DuplicateHandle
GetLocalTime
GetSystemTime
GetCommandLineW
GetUserDefaultLCID
CompareStringW
GetCurrentProcessId
GlobalSize
GetLocaleInfoW
LoadLibraryA
GlobalUnlock
GlobalLock
GlobalAlloc
OpenProcess
CheckRemoteDebuggerPresent
GetUserDefaultLangID
CreateProcessW
ExpandEnvironmentStringsW
IsValidLocale
IsValidLanguageGroup
FormatMessageW
LocalFree
GetProcAddress
GetModuleHandleW
GetCurrentThreadId
GetLastError
Process32Next
CreateToolhelp32Snapshot
CreateProcessA
CloseHandle
SetUnhandledExceptionFilter
TerminateProcess
DecodePointer
GetCurrentProcess
user32
DrawIconEx
MessageBoxW
CharNextExA
PostThreadMessageW
CallNextHookEx
UnhookWindowsHookEx
GetDoubleClickTime
MessageBeep
GetCaretBlinkTime
GetDesktopWindow
SystemParametersInfoW
SendMessageW
PostMessageW
AttachThreadInput
DefWindowProcW
CreateWindowExW
IsChild
DestroyWindow
ShowWindow
SetWindowsHookExW
MoveWindow
SetWindowPos
GetWindowPlacement
SetWindowPlacement
IsWindowVisible
IsIconic
GetClipboardFormatNameW
RegisterClassW
GetCursorInfo
GetIconInfo
CreateIconIndirect
CreateCursor
LoadCursorW
GetCursor
SetCursorPos
NotifyWinEvent
SetMenuItemInfoW
TrackPopupMenuEx
GetMenu
MapVirtualKeyW
ToUnicode
ToAscii
GetKeyboardState
GetKeyState
IsZoomed
PeekMessageW
SetCaretPos
HideCaret
DestroyCaret
CreateCaret
RegisterWindowMessageW
SetFocus
KillTimer
SetTimer
MsgWaitForMultipleObjectsEx
GetQueueStatus
DispatchMessageW
TranslateMessage
RealGetWindowClassW
EnumWindows
GetWindowTextW
GetMessageExtraInfo
FlashWindowEx
TrackMouseEvent
GetCapture
SetCapture
ReleaseCapture
GetSystemMetrics
GetSystemMenu
EnableMenuItem
GetFocus
GetForegroundWindow
SetForegroundWindow
GetDC
ReleaseDC
BeginPaint
EndPaint
GetUpdateRect
SetWindowRgn
InvalidateRect
SetWindowTextW
GetWindowRect
AdjustWindowRectEx
GetKeyboardLayout
GetAsyncKeyState
RegisterClipboardFormatW
ChangeClipboardChain
SetClipboardViewer
LoadIconW
GetSysColor
EnumDisplayMonitors
GetMonitorInfoW
LoadImageW
GetSysColorBrush
ChildWindowFromPointEx
GetCursorPos
GetClientRect
RegisterClassExW
GetClassInfoW
UnregisterClassW
GetKeyboardLayoutList
GetAncestor
DestroyIcon
DestroyCursor
GetWindowThreadProcessId
SetParent
GetParent
SetWindowLongW
GetWindowLongW
ScreenToClient
ClientToScreen
SetCursor
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
SHGetFileInfoW
Shell_NotifyIconW
ole32
CoTaskMemAlloc
CoGetMalloc
ReleaseStgMedium
CoTaskMemFree
DoDragDrop
CoCreateInstance
StringFromGUID2
OleIsCurrentClipboard
OleFlushClipboard
OleGetClipboard
OleSetClipboard
CoCreateGuid
CoInitialize
OleUninitialize
OleInitialize
RevokeDragDrop
RegisterDragDrop
CoLockObjectExternal
CoUninitialize
advapi32
RegCloseKey
RegQueryValueExW
OpenProcessToken
CopySid
FreeSid
GetLengthSid
GetTokenInformation
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegFlushKey
RegQueryInfoKeyW
RegSetValueExW
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
RegOpenKeyExW
ws2_32
WSASendTo
WSASend
WSARecvFrom
WSARecv
WSANtohs
WSANtohl
WSAIoctl
WSAHtonl
WSAConnect
WSAAccept
select
listen
htons
getsockname
WSASocketW
closesocket
bind
__WSAFDIsSet
getsockopt
WSAGetLastError
gethostbyname
gethostbyaddr
ntohl
inet_addr
htonl
WSAAsyncSelect
WSACleanup
WSAStartup
gethostname
getpeername
setsockopt
gdi32
BitBlt
CreateRectRgn
DeleteObject
OffsetRgn
GetDeviceCaps
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
DeleteDC
SelectObject
EnumFontFamiliesExW
CreateFontIndirectW
GetFontData
GetStockObject
AddFontResourceExW
RemoveFontResourceExW
AddFontMemResourceEx
RemoveFontMemResourceEx
GetTextMetricsW
GetObjectW
GetTextFaceW
ChoosePixelFormat
DescribePixelFormat
GetPixelFormat
SetPixelFormat
SwapBuffers
CreateDIBSection
GdiFlush
GetBitmapBits
GetCharABCWidthsW
GetCharABCWidthsFloatW
GetGlyphOutlineW
GetOutlineTextMetricsW
GetTextExtentPoint32W
GetCharABCWidthsI
SetBkMode
SetGraphicsMode
SetTextColor
SetTextAlign
SetWorldTransform
ExtTextOutW
CreateBitmap
GetDIBits
GetRegionData
SelectClipRgn
CombineRgn
oleaut32
SysAllocString
SysFreeString
SysStringLen
VariantInit
VariantChangeType
SystemTimeToVariantTime
SysAllocStringLen
imm32
ImmGetDefaultIMEWnd
ImmReleaseContext
ImmAssociateContext
ImmGetCompositionStringW
ImmNotifyIME
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmGetVirtualKey
ImmGetContext
winmm
PlaySoundW
iphlpapi
GetAdaptersAddresses
GetAdaptersInfo
Sections
.text Size: 6.8MB - Virtual size: 6.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qtmetad Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 223KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ