Static task
static1
Behavioral task
behavioral1
Sample
144e02e610237884ad8c651314a962312270b65bac551550c99647cc8d4e2162.exe
Resource
win7-20230712-en
General
-
Target
144e02e610237884ad8c651314a962312270b65bac551550c99647cc8d4e2162
-
Size
3.5MB
-
MD5
3dbe00b7c62f3606edec24a845789ae2
-
SHA1
7395c362acdbb7256318175c9ee601f5034254d8
-
SHA256
144e02e610237884ad8c651314a962312270b65bac551550c99647cc8d4e2162
-
SHA512
e8db2c34890c25c043ce7f6fdea57870133d091060ecd4b21357e753325022bbc2423c94b89f4ac9f09b1d6b45f15225a78a663c727997f1ebd883828d97cd7a
-
SSDEEP
98304:lq1Gn0r298YOkN6+4QWtfHNxghrUyTO0sm5tB:lt0y9vOz+iftxgjTKmV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 144e02e610237884ad8c651314a962312270b65bac551550c99647cc8d4e2162
Files
-
144e02e610237884ad8c651314a962312270b65bac551550c99647cc8d4e2162.exe windows x86
e3ac4d95180d1fe5a65160c05e101b22
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
GlobalUnlock
GetFileSize
ReadFile
lstrlenW
LoadLibraryW
GetCurrentDirectoryW
CreateFileW
VerSetConditionMask
OpenProcess
MulDiv
VerifyVersionInfoW
GetACP
ExitProcess
WriteFile
SetFilePointer
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
CreateDirectoryW
GetFileAttributesW
LocalFree
GlobalAlloc
GetModuleHandleA
GetLocalTime
lstrcpynW
lstrcpyW
VirtualQuery
MoveFileW
InitializeCriticalSection
Sleep
WaitForSingleObject
FindClose
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetTempPathW
RemoveDirectoryW
CreateFileA
TerminateProcess
DeleteFileW
FindFirstFileW
FindNextFileW
LocalAlloc
GetFileInformationByHandle
GetHandleInformation
GetLogicalDriveStringsW
CreateProcessW
QueryDosDeviceW
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DeviceIoControl
GetSystemDirectoryA
GetEnvironmentVariableW
GetDriveTypeW
VirtualAlloc
VirtualFree
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
GetStartupInfoW
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
VirtualProtect
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlUnwind
GetTimeZoneInformation
GetModuleHandleExW
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
ReadConsoleW
SetEndOfFile
FlushFileBuffers
WriteConsoleW
GetFileAttributesExW
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
ReadConsoleA
SetConsoleMode
SwitchToFiber
DeleteFiber
CreateFiber
GlobalMemoryStatus
SetEvent
CloseHandle
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
QueryPerformanceFrequency
QueryPerformanceCounter
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
CreateEventW
SetLastError
TryEnterCriticalSection
GetStringTypeW
WideCharToMultiByte
FormatMessageW
OutputDebugStringW
IsDebuggerPresent
ConvertFiberToThread
ConvertThreadToFiber
GetSystemTime
InitializeSListHead
UnregisterWait
GetFullPathNameW
ExitThread
PeekNamedPipe
WaitForMultipleObjects
GetEnvironmentVariableA
CompareFileTime
GetSystemDirectoryW
SleepEx
IsProcessorFeaturePresent
FindResourceExW
CreateThread
CopyFileW
MoveFileExW
SetErrorMode
GetModuleFileNameA
LoadLibraryExW
lstrcmpiW
InterlockedIncrement
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
GetModuleHandleW
GetProcAddress
FindResourceW
LoadResource
LockResource
FreeResource
InterlockedDecrement
SizeofResource
GetTickCount
DeleteCriticalSection
GetCurrentThreadId
GetProcessHeap
GetCurrentProcessId
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetCommandLineW
HeapFree
user32
UpdateLayeredWindow
MessageBoxW
SetWindowRgn
InflateRect
SetCursor
LoadCursorW
GetPropW
SetPropW
GetSystemMetrics
EnableWindow
ShowWindow
GetClassInfoExW
RegisterClassExW
RegisterClassW
CallWindowProcW
DefWindowProcW
wsprintfW
GetMonitorInfoW
MonitorFromWindow
LoadImageW
GetWindow
GetParent
SetWindowLongW
GetWindowLongW
PtInRect
IsRectEmpty
OffsetRect
ShowCaret
IntersectRect
GetSysColor
MapWindowPoints
ScreenToClient
CreateAcceleratorTableW
GetWindowRect
GetClientRect
InvalidateRect
MoveWindow
EndPaint
BeginPaint
ReleaseDC
GetDC
KillTimer
SetTimer
ReleaseCapture
SetCapture
SetCaretPos
GetCaretPos
ClientToScreen
UpdateWindow
PrivateExtractIconsW
DestroyIcon
DrawIconEx
GetKeyState
GetFocus
GetActiveWindow
SetFocus
IsZoomed
IsIconic
IsWindowVisible
SetWindowPos
IsWindow
CreateWindowExW
EqualRect
SetWindowTextW
GetWindowRgn
CharPrevW
DrawTextW
FillRect
SetRect
CreatePopupMenu
DestroyMenu
EnableMenuItem
AppendMenuW
TrackPopupMenu
CreateCaret
GetCaretBlinkTime
SendMessageW
GetProcessWindowStation
GetUserObjectInformationW
GetWindowTextW
GetWindowTextLengthW
IsWindowEnabled
wsprintfA
GetCursor
FindWindowW
GetDesktopWindow
MapVirtualKeyExW
GetKeyNameTextW
GetUpdateRect
HideCaret
GetKeyboardLayout
SetForegroundWindow
GetGUIThreadInfo
UnionRect
InvalidateRgn
DestroyWindow
ActivateKeyboardLayout
PostQuitMessage
GetMessageW
DispatchMessageW
PeekMessageW
CharNextW
TranslateMessage
PostMessageW
GetCursorPos
DrawTextA
advapi32
RegisterEventSourceW
CryptExportKey
CryptCreateHash
CryptDestroyHash
CryptSignHashW
GetUserNameW
RegQueryValueExW
LookupAccountSidW
GetTokenInformation
OpenProcessToken
CryptEnumProvidersW
CryptGenRandom
DeregisterEventSource
CryptDecrypt
ReportEventW
CryptAcquireContextW
CryptGetUserKey
CryptReleaseContext
CryptDestroyKey
CryptGetProvParam
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
CryptSetHashParam
RegOpenKeyExW
RegDeleteValueW
shell32
ShellExecuteW
SHGetFolderPathW
ShellExecuteExW
CommandLineToArgvW
SHGetFileInfoW
DragQueryFileW
ole32
CLSIDFromProgID
DoDragDrop
OleDuplicateData
ReleaseStgMedium
CreateStreamOnHGlobal
CLSIDFromString
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
OleLockRunning
oleaut32
SysFreeString
VarUI4FromStr
VariantInit
VariantClear
SysAllocString
shlwapi
PathFileExistsW
PathCombineW
SHDeleteKeyW
PathFindFileNameW
PathRemoveFileSpecW
PathIsDirectoryW
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
psapi
EnumProcessModules
GetModuleFileNameExW
EnumProcesses
GetProcessImageFileNameW
dbghelp
MiniDumpWriteDump
urlmon
ObtainUserAgentString
gdi32
TextOutW
SetTextColor
SetStretchBltMode
StretchBlt
SetBkMode
MoveToEx
GetObjectA
SetBkColor
CreateCompatibleBitmap
GdiFlush
CreatePatternBrush
GetTextExtentPointA
GetBitmapBits
CreateCompatibleDC
ExtSelectClipRgn
SelectClipRgn
LineTo
GetTextExtentPoint32W
GetClipBox
SetBitmapBits
CreateDIBitmap
GetCharABCWidthsW
CreateSolidBrush
CreateRectRgnIndirect
CreatePenIndirect
CombineRgn
CreateDIBSection
PtInRegion
CreateRectRgn
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
PlayEnhMetaFile
GetEnhMetaFileHeader
CreateEnhMetaFileW
CloseEnhMetaFile
SelectObject
SaveDC
RestoreDC
Rectangle
RemoveFontMemResourceEx
AddFontMemResourceEx
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
BitBlt
comctl32
InitCommonControlsEx
_TrackMouseEvent
ord17
gdiplus
GdiplusShutdown
GdipAlloc
GdipFree
GdipCreatePath
GdipDeletePath
GdipAddPathLine
ord1
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipLoadImageFromStream
GdipDeleteFont
GdipLoadImageFromStreamICM
GdipCloneImage
GdipDisposeImage
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipSetTextRenderingHint
GdiplusStartup
GdipDrawRectangleI
GdipDrawPath
GdipFillRectangleI
GdipFillPath
GdipMeasureString
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipDrawImageRectI
GdipGetPropertyItem
GdipCreateFontFromDC
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipStringFormatGetGenericTypographic
GdipDeleteStringFormat
GdipCloneStringFormat
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetStringFormatTrimming
GdipGetImageWidth
GdipCreateFontFromLogfontA
GdipDrawString
GdipSetInterpolationMode
GdipGetPropertyItemSize
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
crypt32
CertCloseStore
CryptMsgGetParam
CertFindCertificateInStore
CryptMsgClose
CertFreeCertificateContext
CertDuplicateCertificateContext
CertOpenStore
CertGetNameStringW
CryptQueryObject
CertOpenSystemStoreW
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertEnumCertificatesInStore
CertGetCertificateContextProperty
ws2_32
ntohs
getnameinfo
sendto
recvfrom
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
gethostbyname
gethostname
WSAStartup
WSACloseEvent
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAIoctl
WSASetLastError
socket
setsockopt
shutdown
htons
getsockopt
getsockname
getpeername
connect
closesocket
recv
send
WSAGetLastError
bind
wldap32
ord147
ord219
ord46
ord301
ord145
ord133
ord79
ord142
ord167
ord127
ord27
ord26
ord117
ord41
ord208
ord216
ord14
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 564KB - Virtual size: 564KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 47KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 622KB - Virtual size: 621KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 179KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE