Static task
static1
Behavioral task
behavioral1
Sample
0a85d50add0092bb843c27cdc7dced040748b281031b83f103fb695a389229b6.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0a85d50add0092bb843c27cdc7dced040748b281031b83f103fb695a389229b6.exe
Resource
win10v2004-20230703-en
General
-
Target
0a85d50add0092bb843c27cdc7dced040748b281031b83f103fb695a389229b6
-
Size
2.1MB
-
MD5
41e3d33c3e34704bc5474cf918b66d69
-
SHA1
49e7161584af12d7746d0a69a06db68c2e2cf1fd
-
SHA256
0a85d50add0092bb843c27cdc7dced040748b281031b83f103fb695a389229b6
-
SHA512
b81e2aba5a81cb5e2470a4358df6f781baff7c78be31b68bb7b73597597edc78d909dc71e22cb45b95dd92fb1578030da60d26eebbfb62c615a760f498c37584
-
SSDEEP
49152:hQSBB5jwbRZj5sagxzT2q6C1E0Glkk6mPWVzOETSXJMscwEe:ViZC37mqSXJMYE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a85d50add0092bb843c27cdc7dced040748b281031b83f103fb695a389229b6
Files
-
0a85d50add0092bb843c27cdc7dced040748b281031b83f103fb695a389229b6.exe windows x86
e5c5fcc8fe5bb006ec2f695c3d747284
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GetOverlappedResult
CreateNamedPipeW
SetNamedPipeHandleState
DisconnectNamedPipe
ConnectNamedPipe
CreateFileW
ReleaseMutex
ResetEvent
WinExec
GetBinaryTypeW
FindNextFileW
FindClose
ExpandEnvironmentStringsW
CreateThread
WritePrivateProfileStructW
GetPrivateProfileStructW
WritePrivateProfileStringW
GetPrivateProfileIntW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
WideCharToMultiByte
MoveFileExW
GetPrivateProfileStringW
lstrcpyW
GlobalLock
GlobalUnlock
GlobalAlloc
GetTickCount
GetVersion
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetStdHandle
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetStdHandle
GetTimeZoneInformation
GetConsoleMode
SetFilePointerEx
GetFileType
GetModuleHandleExW
ExitThread
GetFileAttributesExW
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
SuspendThread
SetThreadContext
GetThreadContext
VirtualQuery
FlushFileBuffers
GetSystemWindowsDirectoryW
lstrcmpiA
lstrcmpA
DeviceIoControl
UnhandledExceptionFilter
SetDllDirectoryW
GetLocalTime
ResumeThread
InterlockedCompareExchange
InterlockedExchange
GetCurrentThread
TerminateProcess
Sleep
GetTempPathW
WriteFile
SetFileAttributesW
SetFileAttributesA
SetEndOfFile
ReadFile
GetFileSize
GetFileAttributesA
CreateFileA
lstrlenW
lstrcpynW
FreeLibrary
WaitForMultipleObjects
CreateEventW
SetEvent
IsBadReadPtr
GetModuleFileNameW
VirtualProtect
GetCurrentThreadId
GetCurrentProcessId
WaitForSingleObject
SetUnhandledExceptionFilter
OutputDebugStringW
MultiByteToWideChar
LoadLibraryW
FindResourceW
SizeofResource
LockResource
LoadResource
GetProcAddress
GetModuleHandleW
FindResourceExW
GetSystemDirectoryW
lstrcmpW
ExitProcess
FreeResource
MulDiv
GetACP
InterlockedDecrement
InterlockedIncrement
LocalFree
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
GetExitCodeThread
SwitchToThread
WaitForSingleObjectEx
DuplicateHandle
TryEnterCriticalSection
FormatMessageW
GetStringTypeW
SetFilePointer
GetFileSizeEx
OpenFileMappingW
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
GetVersionExW
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
GetTempFileNameW
GetCommandLineW
GetStartupInfoW
CreateProcessW
GetCurrentProcess
CreateMutexW
CloseHandle
DeleteFileW
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
GetConsoleCP
DecodePointer
user32
PostQuitMessage
ShowWindow
EnableWindow
GetWindow
GetAsyncKeyState
keybd_event
GetMenuStringW
GetMessageW
PtInRect
MapWindowPoints
ScreenToClient
ClientToScreen
DispatchMessageW
GetClientRect
KillTimer
SetTimer
GetFocus
SetFocus
DestroyWindow
SendMessageW
GetMonitorInfoW
MonitorFromPoint
GetParent
CopyRect
GetCursorPos
ReleaseCapture
GetWindowRect
SetCapture
MoveWindow
FindWindowW
IsWindow
SetWindowPos
UnregisterClassW
PostMessageW
RegisterWindowMessageW
TranslateMessage
CreatePopupMenu
FindWindowExW
GetKeyState
GetActiveWindow
IsClipboardFormatAvailable
EnumThreadWindows
ChangeWindowMessageFilter
MonitorFromWindow
ClipCursor
IsWindowEnabled
AddClipboardFormatListener
IsIconic
IsWindowVisible
SetWindowPlacement
GetWindowPlacement
UnregisterHotKey
RegisterHotKey
OffsetRect
FrameRect
FillRect
GetCaretPos
SetCaretPos
InvalidateRect
EndPaint
BeginPaint
GetWindowDC
DrawTextW
CallWindowProcW
IsZoomed
MapVirtualKeyW
GetKeyNameTextW
MessageBoxExW
SetWindowTextW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetClassNameW
SetWindowLongW
GetWindowLongW
WindowFromPoint
CreateWindowExW
RegisterClassExW
GetDoubleClickTime
DefWindowProcW
EnumDisplayMonitors
MonitorFromRect
DestroyMenu
DrawIconEx
DestroyIcon
GetWindowThreadProcessId
IntersectRect
ReleaseDC
GetDC
SetForegroundWindow
GetForegroundWindow
InsertMenuItemW
EmptyClipboard
RegisterClipboardFormatW
SetClipboardData
CloseClipboard
OpenClipboard
BringWindowToTop
AttachThreadInput
GetAncestor
TrackPopupMenuEx
DeleteMenu
GetMenuItemCount
wsprintfW
wvsprintfW
SetCursor
InflateRect
UnionRect
LoadCursorW
IsChild
UpdateLayeredWindow
CharNextW
GetUpdateRect
CreateCaret
GetCaretBlinkTime
IsRectEmpty
RegisterClassW
GetClassInfoExW
GetSystemMetrics
SetPropW
GetPropW
LoadImageW
SystemParametersInfoW
SetWindowRgn
MessageBoxW
GetWindowTextW
GetWindowTextLengthW
RemovePropW
CharPrevW
SetRect
HideCaret
ShowCaret
GetSysColor
CreateAcceleratorTableW
InvalidateRgn
GetIconInfo
gdi32
BitBlt
CreateCompatibleBitmap
GetDeviceCaps
CreateFontIndirectW
CreatePen
Rectangle
RestoreDC
SaveDC
GetStockObject
SetWindowOrgEx
CreateRoundRectRgn
CombineRgn
CreateRectRgnIndirect
GetCharABCWidthsW
CreateCompatibleDC
SelectClipRgn
ExtSelectClipRgn
StretchBlt
SetStretchBltMode
SetDIBColorTable
TextOutW
GetDIBits
SetDIBitsToDevice
DeleteObject
SetBkColor
SelectObject
SetTextColor
ExtTextOutW
CreateDIBSection
GetObjectW
CreateDCW
GetTextExtentPoint32W
DeleteDC
GetClipBox
CreateSolidBrush
GetTextMetricsW
SetBkMode
advapi32
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegCreateKeyW
GetTokenInformation
shell32
SHGetKnownFolderItem
ord152
DragQueryFileW
ShellExecuteW
SHCreateShellItemArrayFromShellItem
SHGetIDListFromObject
SHGetFileInfoW
SHCreateItemFromIDList
SHCreateItemFromParsingName
DragFinish
ord190
ord727
SHBrowseForFolderW
SHParseDisplayName
ord68
SHGetDesktopFolder
ShellExecuteExW
ord21
ord155
ord25
SHGetPathFromIDListW
ord165
SHGetSpecialFolderPathW
ole32
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
OleInitialize
OleUninitialize
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CoCreateGuid
ReleaseStgMedium
CoLockObjectExternal
RegisterDragDrop
RevokeDragDrop
DoDragDrop
OleSetClipboard
OleGetClipboard
oleaut32
SysAllocString
VariantClear
VariantInit
SafeArrayCreate
SafeArrayPutElement
SysFreeString
shlwapi
PathFindFileNameW
PathFindExtensionW
StrRetToStrW
StrCmpIW
ord158
ord219
StrStrIW
StrRetToBufW
PathRemoveFileSpecW
PathIsDirectoryW
PathFileExistsW
PathCombineW
PathAppendW
ord176
StrCpyW
ord172
ord174
StrStrIA
SHAutoComplete
SHGetValueA
SHSetValueA
StrCmpNIW
StrTrimA
urlmon
URLDownloadToFileW
URLDownloadToCacheFileW
gdiplus
GdipDrawImageRectI
GdipLoadImageFromStreamICM
GdipImageGetFrameDimensionsCount
GdipImageGetFrameCount
GdipLoadImageFromFile
GdipDrawEllipseI
GdipAddPathArc
GdipDrawImageRectRectI
GdipDrawImagePointsI
GdipFillPath
GdipGraphicsClear
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdiplusStartup
GdipAlloc
GdipGetImagePixelFormat
GdipCloneBitmapAreaI
GdipCreateHBITMAPFromBitmap
GdipImageGetFrameDimensionsList
GdipFree
GdipCreateBitmapFromStream
GdipCreateTexture
GdipClosePathFigure
GdipFillEllipseI
GdipDrawPath
GdiplusShutdown
GdipGetPropertyItem
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipDrawImageRectRect
GdipSetInterpolationMode
GdipSetSmoothingMode
GdipDeleteGraphics
GdipBitmapSetPixel
GdipCreateBitmapFromScan0
GdipCreateBitmapFromFile
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipSaveImageToFile
GdipDisposeImage
GdipDrawRectangleI
GdipCreatePath
GdipDeletePath
GdipAddPathLineI
GdipAddPathArcI
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipSetPenDashStyle
GdipCreateFromHDC
GdipDrawLineI
GdipCloneImage
imm32
ImmAssociateContext
propsys
InitVariantFromBuffer
comctl32
ord410
ord412
ord413
ImageList_Destroy
ord17
_TrackMouseEvent
InitCommonControlsEx
ImageList_DrawEx
msimg32
GradientFill
AlphaBlend
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
crypt32
CertGetNameStringW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 358KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ