Static task
static1
Behavioral task
behavioral1
Sample
c85d3e858e0e67a52fc402e5bff01d20a5e8ca1060bc4d72fcd31f518567ec3c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c85d3e858e0e67a52fc402e5bff01d20a5e8ca1060bc4d72fcd31f518567ec3c.exe
Resource
win10v2004-20230824-en
General
-
Target
c85d3e858e0e67a52fc402e5bff01d20a5e8ca1060bc4d72fcd31f518567ec3c
-
Size
363KB
-
MD5
1be833718267c4beac8fefe66e2b7070
-
SHA1
d827f31acd3815fa4446eea67a90a7bdf6e5e6a4
-
SHA256
c85d3e858e0e67a52fc402e5bff01d20a5e8ca1060bc4d72fcd31f518567ec3c
-
SHA512
029f2e8ebff7452aa234b1a320088ccd9517e778d64c88aaea6bf85fc883d309a4c2769485afa75844fb9a178ee87baf037e7ea4a21556d2989fdf0b081d4782
-
SSDEEP
6144:yuTSI/p0ee79vN230P2LlfE5V0m/8ZOPqvqPeQEP1:LTSI/p0ee79v4vlfE56G8QqPQEP1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c85d3e858e0e67a52fc402e5bff01d20a5e8ca1060bc4d72fcd31f518567ec3c
Files
-
c85d3e858e0e67a52fc402e5bff01d20a5e8ca1060bc4d72fcd31f518567ec3c.exe windows x64
30b479c74ee17f1c2f38f1c761f983df
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
RtlPcToFileHeader
HeapSize
RtlVirtualUnwind
HeapSetInformation
HeapCreate
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
GetStdHandle
GetACP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
RaiseException
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
RtlUnwindEx
RtlLookupFunctionEntry
GetStartupInfoA
GetProcessHeap
GetCommandLineA
HeapReAlloc
ExitProcess
GetSystemTimeAsFileTime
HeapAlloc
RtlCaptureContext
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
HeapFree
SetErrorMode
GetCurrentProcess
FlushFileBuffers
MoveFileA
GetThreadLocale
GetOEMCP
GetCPInfo
GetModuleFileNameW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringA
GetTickCount
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
lstrcmpA
GlobalFree
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GetCurrentThreadId
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
lstrcmpW
GetVersionExA
FreeResource
GlobalLock
GlobalUnlock
GetCurrentProcessId
GetModuleHandleA
GlobalGetAtomNameA
GlobalAddAtomA
SetLastError
SetFileTime
WriteFile
LocalFileTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
ReadFile
CloseHandle
SetFilePointer
CreateFileA
LockResource
WideCharToMultiByte
GetLastError
Sleep
GetFileAttributesA
CreateDirectoryA
FindClose
FindFirstFileA
MultiByteToWideChar
GetVersion
CompareStringA
LoadLibraryA
GetProcAddress
SizeofResource
LoadResource
FindResourceA
lstrlenW
GetFileType
lstrlenA
user32
UnregisterClassA
GetSysColorBrush
EndPaint
BeginPaint
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
LoadCursorA
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
CreateDialogIndirectParamA
EndDialog
RegisterClipboardFormatA
PostQuitMessage
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
DispatchMessageA
GetTopWindow
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
MessageBoxA
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetClientRect
PtInRect
GetDC
ReleaseDC
GetWindowRect
GetSystemMetrics
RegisterWindowMessageA
wsprintfA
UpdateWindow
EnableWindow
DestroyMenu
GetClassNameA
GetSysColor
WinHelpA
SetWindowPos
SetFocus
GetWindowThreadProcessId
GetActiveWindow
IsWindowEnabled
GetFocus
GetDlgItem
GetKeyState
GetDlgCtrlID
GetWindowTextA
IsWindow
GetWindow
ShowWindow
GetWindowLongA
GetDesktopWindow
PostMessageA
GetLastActivePopup
CopyRect
GetClassInfoA
GetMenuItemCount
GetMenuItemID
GetSubMenu
SendMessageA
IsIconic
IsWindowVisible
SetActiveWindow
GetParent
GetCapture
PeekMessageA
SetCursor
LoadIconA
GetMenu
GetNextDlgTabItem
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetMapMode
RestoreDC
SaveDC
GetStockObject
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
DeleteDC
GetObjectA
DeleteObject
SelectObject
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 216KB - Virtual size: 215KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ