Static task
static1
Behavioral task
behavioral1
Sample
a2e478b78f303b729a0fc21fd0ef099785bd0809f2ef5e84b528fdbb9a5525a4.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a2e478b78f303b729a0fc21fd0ef099785bd0809f2ef5e84b528fdbb9a5525a4.exe
Resource
win10v2004-20230824-en
General
-
Target
a2e478b78f303b729a0fc21fd0ef099785bd0809f2ef5e84b528fdbb9a5525a4
-
Size
1.0MB
-
MD5
e19586b05e6cfdca14e790ed1eb7f3dc
-
SHA1
dac90b90e1bc53d14b55f196336b5dc9aab39eee
-
SHA256
a2e478b78f303b729a0fc21fd0ef099785bd0809f2ef5e84b528fdbb9a5525a4
-
SHA512
8e765ec2b5c437113be95f72916e9724e6df67f7b559203bd89597d005aeebddb8e7227f65162739425b18cb538b6a6d9f02d6aa20a8b3b737a78dbb638e1340
-
SSDEEP
24576:0ZlrtX4Wk5AU3s2mPPFf4U4/wearF1wWy4:8xcAUeP29/wiWy4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2e478b78f303b729a0fc21fd0ef099785bd0809f2ef5e84b528fdbb9a5525a4
Files
-
a2e478b78f303b729a0fc21fd0ef099785bd0809f2ef5e84b528fdbb9a5525a4.exe windows x64
4f64d55966c08dba7c2c9a305124257b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
FindFirstFileW
GetFileSizeEx
FindNextFileW
RemoveDirectoryW
SetEndOfFile
FindClose
GetFileAttributesExW
Wow64DisableWow64FsRedirection
GetModuleFileNameW
Wow64RevertWow64FsRedirection
MultiByteToWideChar
WideCharToMultiByte
WriteConsoleW
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
CreateDirectoryW
ExitProcess
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileType
GetFileInformationByHandle
GetDriveTypeW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
LoadLibraryW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
RaiseException
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
LocalFree
GetSystemTimeAsFileTime
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetExitCodeProcess
CreateProcessW
PeekNamedPipe
CreatePipe
TerminateProcess
ReadFile
GetProcessHeap
SetFilePointerEx
HeapAlloc
DeleteFileW
WriteFile
HeapFree
SetUnhandledExceptionFilter
GetSystemTime
CloseHandle
CreateFileW
GetCurrentProcess
GetLastError
MoveFileW
GetCurrentProcessId
FreeLibrary
GetStdHandle
GetProcAddress
SizeofResource
Sleep
GetCurrentThreadId
GetThreadUILanguage
OutputDebugStringW
GetModuleHandleW
GetCPInfo
LCMapStringEx
DecodePointer
EncodePointer
CompareStringEx
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
SetThreadUILanguage
FindResourceW
LoadResource
LockResource
CreateThread
GetStringTypeW
GetExitCodeThread
WaitForSingleObjectEx
user32
PostMessageW
CheckRadioButton
SendMessageW
SetWindowTextW
SetDlgItemTextW
LoadIconW
GetDlgItem
MoveWindow
EnableWindow
GetDlgItemTextW
SetMenuItemInfoW
GetSubMenu
ReleaseDC
GetClientRect
GetParent
EnableMenuItem
TrackPopupMenu
RegisterClassExW
PostQuitMessage
GetClassInfoExW
LoadImageW
GetMessageW
CreateDialogParamW
GetPropW
EndDialog
LoadStringW
DispatchMessageW
IsDialogMessageW
SetPropW
TranslateMessage
DialogBoxParamW
DestroyWindow
GetSystemMetrics
BeginPaint
EndPaint
GetWindowThreadProcessId
GetMenuState
InflateRect
IsWindowVisible
SetWindowPos
CreateWindowExW
GetWindowPlacement
LoadAcceleratorsW
SetTimer
DestroyAcceleratorTable
AttachThreadInput
GetForegroundWindow
DestroyMenu
SetFocus
TranslateAcceleratorW
ChangeWindowMessageFilterEx
SetParent
DrawMenuBar
CheckMenuItem
DrawTextW
SystemParametersInfoW
RegisterWindowMessageW
DrawFrameControl
SetForegroundWindow
IsIconic
GetCursorPos
GetWindowTextW
DefWindowProcW
GetWindowRect
FillRect
ShowWindow
GetAsyncKeyState
ClientToScreen
AdjustWindowRect
SetCapture
CheckDlgButton
GetDesktopWindow
PtInRect
UpdateWindow
ReleaseCapture
InvalidateRect
IsDlgButtonChecked
GetMenuItemInfoW
GetMenu
InsertMenuItemW
GetDC
MessageBoxW
SetWindowLongPtrW
CreatePopupMenu
GetWindowLongPtrW
gdi32
SetBkColor
BitBlt
StretchBlt
GetStockObject
GetDIBits
LineTo
CreatePen
SetDIBits
MoveToEx
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
SetTextColor
SetBkMode
DeleteObject
CreateSolidBrush
advapi32
RegCreateKeyExW
RegDeleteKeyValueW
RegSetKeyValueW
RegCloseKey
RegGetValueW
shell32
Shell_NotifyIconW
DragQueryFileW
DragFinish
SHGetKnownFolderPath
ShellExecuteW
ole32
CoSetProxyBlanket
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitializeEx
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
comctl32
ord412
InitCommonControlsEx
ord410
ord413
dbghelp
MiniDumpWriteDump
urlmon
URLDownloadToFileW
wininet
InternetQueryOptionW
InternetOpenW
HttpQueryInfoW
InternetCrackUrlW
HttpSendRequestW
InternetCloseHandle
DeleteUrlCacheEntryW
HttpOpenRequestW
InternetConnectW
InternetSetOptionW
InternetReadFile
HttpAddRequestHeadersW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
Sections
.text Size: 557KB - Virtual size: 557KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 348KB - Virtual size: 347KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ