Static task
static1
Behavioral task
behavioral1
Sample
a26c96d3d1f537a3f3b93b95f58e57aa3659ac2d579f6e7b1a45cf8399cec4b7.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a26c96d3d1f537a3f3b93b95f58e57aa3659ac2d579f6e7b1a45cf8399cec4b7.exe
Resource
win10v2004-20230703-en
General
-
Target
a26c96d3d1f537a3f3b93b95f58e57aa3659ac2d579f6e7b1a45cf8399cec4b7
-
Size
304KB
-
MD5
17b16650f25862d7cc59c5bed27402d6
-
SHA1
c047f33c81bf9d17d429205c1e558dd17ae39f7c
-
SHA256
a26c96d3d1f537a3f3b93b95f58e57aa3659ac2d579f6e7b1a45cf8399cec4b7
-
SHA512
afa3a426d0a2493a87dbce8049b0fc14c7daa8477e92d4b9ab363001da0d58b98aa73b3163de6d60e2b28035ce84afb5a70b5ed81128fb2ca582a45562bc9851
-
SSDEEP
6144:4XDA6x5vjFgBjo+EDbSG6VSqLbOCyrMXi+F:v6x5rFg1oVSG6UqLbOCyrMXj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a26c96d3d1f537a3f3b93b95f58e57aa3659ac2d579f6e7b1a45cf8399cec4b7
Files
-
a26c96d3d1f537a3f3b93b95f58e57aa3659ac2d579f6e7b1a45cf8399cec4b7.exe windows x86
45f8f6ef08e823e2dd711b5c85c3b506
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
RaiseException
HeapAlloc
HeapFree
GetTimeZoneInformation
GetSystemTime
GetLocalTime
TerminateProcess
HeapReAlloc
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
GetCommandLineA
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStartupInfoA
GetSystemTimeAsFileTime
InterlockedExchange
RtlUnwind
SetErrorMode
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
GetVolumeInformationA
FindFirstFileA
FindClose
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GlobalFlags
GetLastError
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetFullPathNameA
GetTempFileNameA
GetFileAttributesA
GlobalAlloc
lstrcmpA
GetCurrentThread
FileTimeToLocalFileTime
FileTimeToSystemTime
MulDiv
SetLastError
CloseHandle
lstrcpynA
FormatMessageA
LocalFree
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedIncrement
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GetProcAddress
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
Sleep
CreateDirectoryA
HeapDestroy
InterlockedDecrement
user32
SetRect
CharUpperA
GetDCEx
LockWindowUpdate
SetCapture
SetParent
PtInRect
GetClassNameA
ShowOwnedPopups
PostQuitMessage
IsZoomed
InflateRect
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
BringWindowToTop
InvalidateRect
UnpackDDElParam
ReuseDDElParam
SetMenu
DestroyMenu
GetDesktopWindow
SetCursor
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
WindowFromPoint
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
LoadIconA
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
IsWindowVisible
GetTopWindow
SendMessageA
EnableWindow
UnregisterClassA
GetClientRect
GetSubMenu
LoadMenuA
MessageBoxA
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
KillTimer
SetTimer
LoadStringA
GetSysColorBrush
CheckMenuItem
LoadCursorA
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
IsWindowEnabled
GetDlgItem
GetWindowLongA
GetParent
DestroyWindow
CreateDialogIndirectParamA
GetSystemMetrics
IsWindow
SetActiveWindow
GetActiveWindow
EndDialog
GetNextDlgTabItem
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
gdi32
CreatePatternBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
CombineRgn
CreateRectRgnIndirect
CreateFontIndirectA
GetTextExtentPoint32A
GetTextMetricsA
GetDeviceCaps
CreateRectRgn
DeleteObject
SetRectRgn
IntersectClipRect
ExcludeClipRect
SelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
GetFileSecurityA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
SetFileSecurityA
shell32
DragQueryFileA
DragFinish
ShellExecuteA
comctl32
ord17
ImageList_Destroy
oleaut32
VariantClear
VariantInit
VariantCopy
SysFreeString
SysAllocString
VariantChangeType
SysAllocStringByteLen
SysStringByteLen
GetErrorInfo
urlmon
URLDownloadToFileA
Sections
.text Size: 208KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ