Static task
static1
Behavioral task
behavioral1
Sample
976c4f3b9b9679a1f59d3a9e0d100907f28c399ec8816f3d82420482a699c548.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
976c4f3b9b9679a1f59d3a9e0d100907f28c399ec8816f3d82420482a699c548.exe
Resource
win10v2004-20230703-en
General
-
Target
976c4f3b9b9679a1f59d3a9e0d100907f28c399ec8816f3d82420482a699c548
-
Size
834KB
-
MD5
057aefae8a6074e856ace5a340ec7f14
-
SHA1
c371015122416fc9a177634492767fe72db16a01
-
SHA256
976c4f3b9b9679a1f59d3a9e0d100907f28c399ec8816f3d82420482a699c548
-
SHA512
b1e2c6a4e9dca8e6a92140134c6fdb1f27c9da91dc2bdb8bf5efe981ecc3a6a4d45a4f283209ee6e2d5a48343816fc915012dd5ffb42cafae58c5f395ab35a8d
-
SSDEEP
12288:N3Yrdc8CrhbhIAfugk36Bl4INWDOVC9womdULCNCa7i:z8C1bhju16B7NWx6B08
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 976c4f3b9b9679a1f59d3a9e0d100907f28c399ec8816f3d82420482a699c548
Files
-
976c4f3b9b9679a1f59d3a9e0d100907f28c399ec8816f3d82420482a699c548.exe windows x86
bc22c80c21e31866c29b2752a4f19d23
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
SetLastError
lstrcpynA
GetVersion
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetCurrentProcessId
OpenFileMappingA
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
CreateSemaphoreA
ResumeThread
ReleaseSemaphore
WriteConsoleW
GetTimeZoneInformation
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
FindNextFileW
FindFirstFileExW
GetStringTypeW
CreateFileW
SetFilePointerEx
GetFileSizeEx
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
GetFileType
LCMapStringW
CompareStringW
SetEnvironmentVariableW
DecodePointer
GetModuleFileNameW
GetStdHandle
GetACP
IsValidCodePage
HeapQueryInformation
HeapSize
EnterCriticalSection
LeaveCriticalSection
FindResourceA
LoadResource
LockResource
GetFullPathNameA
WritePrivateProfileStringA
CreateThread
CreateEventA
GetTempPathA
GetFileAttributesA
CopyFileA
SetCurrentDirectoryA
GetCommandLineA
GetModuleFileNameA
Sleep
WideCharToMultiByte
MultiByteToWideChar
GetProfileStringA
CreateFileA
WriteFile
ReadFile
GetLastError
WaitForMultipleObjects
SetEvent
GlobalAlloc
WaitForSingleObject
CloseHandle
MulDiv
GetCurrentThreadId
ExitProcess
GetModuleHandleA
GetProcAddress
LoadLibraryA
FreeLibrary
GlobalSize
GlobalLock
GlobalFree
InterlockedDecrement
GetModuleHandleExW
GetCommandLineW
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
EncodePointer
RaiseException
RtlUnwind
TerminateProcess
GetModuleHandleW
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
SetErrorMode
GetOEMCP
GetCPInfo
GetProcessVersion
DeleteCriticalSection
InitializeCriticalSection
lstrcatA
lstrlenA
WinExec
lstrcpyA
FindFirstFileA
FindNextFileA
GetFileTime
GetFileSize
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
LocalFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GlobalFlags
LocalAlloc
FindClose
GetVolumeInformationA
GetTickCount
GlobalUnlock
GlobalReAlloc
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
TlsAlloc
GlobalGetAtomNameA
user32
GetSystemMetrics
RedrawWindow
InvalidateRect
EnableWindow
wsprintfA
IsWindowVisible
FillRect
OffsetRect
GetClientRect
PtInRect
SetParent
SendMessageA
LoadCursorA
IsRectEmpty
IsWindow
GetWindowLongA
SetWindowLongA
DestroyIcon
IntersectRect
GetSysColor
InflateRect
SetRect
SetScrollPos
SetScrollRange
GetScrollRange
PostMessageA
SetCapture
GetWindowRect
GetParent
GetCapture
ReleaseCapture
SetTimer
KillTimer
WinHelpA
LoadBitmapA
CopyRect
GetFocus
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
UpdateWindow
SetWindowRgn
DestroyCursor
DestroyAcceleratorTable
IsChild
GetWindow
GetTopWindow
GetActiveWindow
SetWindowPos
SetFocus
DestroyMenu
SetActiveWindow
IsIconic
PeekMessageA
SetMenu
GetMenu
SetCursorPos
GetCursorPos
DeleteMenu
RegisterClassA
CreateWindowExA
SetPropA
DefWindowProcW
GetPropA
TranslateMessage
LoadIconA
CreatePopupMenu
AppendMenuA
ModifyMenuA
CreateMenu
CreateAcceleratorTableA
GetSubMenu
EnableMenuItem
GetDC
ReleaseDC
SetForegroundWindow
EqualRect
ValidateRect
GetDlgCtrlID
EnumDisplaySettingsA
LoadImageA
MessageBoxA
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
DrawFrameControl
DrawEdge
GetWindowPlacement
RegisterWindowMessageA
GetForegroundWindow
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
UnhookWindowsHookEx
GetClassLongA
CallNextHookEx
SetWindowsHookExA
DestroyWindow
GetWindowTextA
GetWindowTextLengthA
GetDlgItem
GetMenuItemID
GetMenuItemCount
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
CharUpperA
UnregisterClassA
ScrollWindowEx
IsDialogMessageA
SetWindowTextA
MoveWindow
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
GetNextDlgTabItem
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
CreateDialogIndirectParamA
EndDialog
GetClassNameA
GetDesktopWindow
GetSysColorBrush
LoadStringA
DrawFocusRect
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetMessageA
DispatchMessageA
SetRectEmpty
RegisterClipboardFormatA
ClientToScreen
WindowFromPoint
SystemParametersInfoA
ShowWindow
SetCursor
IsWindowEnabled
TranslateAcceleratorA
GetKeyState
CopyAcceleratorTableA
PostQuitMessage
IsZoomed
GetClassInfoA
DefWindowProcA
GetSystemMenu
gdi32
CreatePolygonRgn
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
SetStretchBltMode
StretchBlt
CreateDIBitmap
GetClipRgn
SelectClipRgn
DeleteObject
LPtoDP
CreateRectRgnIndirect
DeleteDC
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
EndDoc
GetTextColor
GetBkMode
GetBkColor
GetROP2
GetStretchBltMode
GetPolyFillMode
StartPage
EndPage
CreateCompatibleBitmap
CreateDCA
DPtoLP
CreateBitmap
CreateCompatibleDC
SelectObject
BitBlt
GetObjectA
CreatePen
PatBlt
Rectangle
Ellipse
RoundRect
CombineRgn
CreateRectRgn
FillRgn
GetCurrentObject
GetTextExtentPoint32A
CreateSolidBrush
GetStockObject
CreateFontIndirectA
GetTextMetricsA
GetClipBox
SetTextColor
SaveDC
RestoreDC
SetBkMode
SetPolyFillMode
SetROP2
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExcludeClipRect
MoveToEx
LineTo
StartDocA
SetBkColor
GetDIBits
RealizePalette
SelectPalette
CreatePalette
GetSystemPaletteEntries
GetDeviceCaps
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetViewportExtEx
ExtSelectClipRgn
winmm
midiStreamRestart
midiStreamClose
midiOutReset
midiStreamStop
midiStreamOut
midiOutPrepareHeader
midiStreamProperty
midiStreamOpen
midiOutUnprepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
waveOutPrepareHeader
waveOutUnprepareHeader
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
shell32
ShellExecuteA
Shell_NotifyIconA
ole32
CLSIDFromString
OleInitialize
OleUninitialize
oleaut32
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
comctl32
ord17
ImageList_Destroy
ws2_32
accept
getpeername
inet_ntoa
recv
WSACleanup
ioctlsocket
recvfrom
WSAAsyncSelect
closesocket
comdlg32
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
Sections
.text Size: 567KB - Virtual size: 567KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ