Static task
static1
Behavioral task
behavioral1
Sample
649bcc78cb82e2df91081051789f539c3fcd18ab2611e7ac07e72ec5237603bf.exe
Resource
win7-20230712-en
General
-
Target
649bcc78cb82e2df91081051789f539c3fcd18ab2611e7ac07e72ec5237603bf
-
Size
2.0MB
-
MD5
13cdf96ae8d1f7e5a1e4a5b6c33bee1e
-
SHA1
e309c2260ad543e922d77fa8934dfb6dd526225e
-
SHA256
649bcc78cb82e2df91081051789f539c3fcd18ab2611e7ac07e72ec5237603bf
-
SHA512
c1016067f8b4e16be7df31425b17e2d3f6d0a0c33b362172df1928d7815644b85921366d54ac7d7e8a1ec5ba2bedf057b9a1c077249b33998d4ac5efcaf4093f
-
SSDEEP
24576:eDsOeyv6uLf8Kraplus80upY5i65uO8PtA6FtxTWxw+HwCH7UO601HRTn/JC176k:eDsNsL9GpkY1J6FtxKC+HGEHRTsAyz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 649bcc78cb82e2df91081051789f539c3fcd18ab2611e7ac07e72ec5237603bf
Files
-
649bcc78cb82e2df91081051789f539c3fcd18ab2611e7ac07e72ec5237603bf.exe windows x86
5d0665b80f6e644e48ca660b630568d8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatW
lstrlenW
IsBadWritePtr
InterlockedIncrement
InterlockedDecrement
MulDiv
GetLocalTime
IsDebuggerPresent
GetCurrentThread
SetUnhandledExceptionFilter
GetCurrentProcessId
VirtualQuery
VirtualFree
VirtualAlloc
FlushInstructionCache
GetCommandLineW
WideCharToMultiByte
MultiByteToWideChar
SetFilePointer
SetEndOfFile
ReadFile
WriteFile
CopyFileW
FindNextFileW
FindFirstFileW
CreateDirectoryW
FindClose
GetFileSize
CreateFileW
CloseHandle
GetFileTime
TerminateProcess
GetCurrentProcess
IsBadReadPtr
DeleteFileW
GetTempFileNameW
GetTempPathW
GetSystemDirectoryW
FindResourceExW
FindResourceW
TlsFree
TlsSetValue
WriteConsoleW
GetConsoleCP
FlushFileBuffers
ReadConsoleW
GetConsoleMode
SetFilePointerEx
CreateThread
WaitForSingleObjectEx
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
SetConsoleCtrlHandler
SetStdHandle
GetFullPathNameA
lstrcpyW
SetCurrentDirectoryW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
GetStdHandle
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetTimeZoneInformation
LoadLibraryExW
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwind
GlobalUnlock
GlobalLock
GlobalSize
GetDiskFreeSpaceExW
IsDBCSLeadByte
MapViewOfFileEx
GetFullPathNameW
WritePrivateProfileStructW
GetPrivateProfileStructW
GetPrivateProfileSectionNamesW
WritePrivateProfileSectionW
GetPrivateProfileSectionW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
ExpandEnvironmentStringsW
GlobalFree
GlobalAlloc
TlsGetValue
TlsAlloc
SizeofResource
LoadResource
GetCurrentThreadId
LockResource
FileTimeToSystemTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetSystemTimeAsFileTime
LoadLibraryA
GetFileAttributesW
OutputDebugStringA
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
LoadLibraryW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetLastError
GetLastError
RaiseException
GetProcessHeap
DecodePointer
HeapSize
HeapFree
GetCurrentDirectoryW
HeapReAlloc
HeapAlloc
HeapDestroy
GetVersion
GetProcAddress
FormatMessageW
OpenSemaphoreW
CreateSemaphoreW
ReleaseSemaphore
GetDriveTypeW
DeviceIoControl
GetLogicalDrives
OpenMutexW
CreateMutexW
OpenFileMappingW
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
WaitForSingleObject
ReleaseMutex
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
ProcessIdToSessionId
LocalFree
GetVersionExW
InitializeCriticalSection
FreeLibrary
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
GetStringTypeW
CreateEventW
SwitchToThread
GetTickCount
EncodePointer
user32
IsWindowEnabled
SetWindowPos
CallWindowProcW
SendMessageW
UnregisterClassW
InvalidateRect
UpdateWindow
UpdateLayeredWindow
GetClassInfoExW
RegisterClassExW
wvsprintfW
SetWindowLongA
GetWindowLongA
IsWindowUnicode
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
InflateRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
SetForegroundWindow
DrawTextW
EndMenu
TrackPopupMenu
DeleteMenu
InsertMenuW
GetMenuItemCount
GetSubMenu
DestroyMenu
LoadMenuW
EnableWindow
ReleaseCapture
SetCapture
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
BringWindowToTop
SetWindowPlacement
MoveWindow
GetClassInfoW
RegisterClassW
DefWindowProcW
DispatchMessageW
TranslateMessage
GetMessageW
LoadStringW
LoadBitmapW
FrameRect
ScreenToClient
ClientToScreen
EndPaint
BeginPaint
KillTimer
SetTimer
GetFocus
SetFocus
SendDlgItemMessageW
GetDlgItem
IsWindowVisible
ShowWindow
CreateWindowExW
PostMessageW
AttachThreadInput
IsIconic
mouse_event
GetForegroundWindow
SetCursorPos
GetWindowThreadProcessId
SetPropW
GetPropW
MessageBoxW
GetIconInfo
EnumDisplayMonitors
GetMonitorInfoW
MonitorFromWindow
MonitorFromRect
MonitorFromPoint
SystemParametersInfoW
GetWindow
MapWindowPoints
EndDialog
DialogBoxParamW
CreateDialogParamW
DestroyWindow
IsWindow
LoadCursorW
OffsetRect
SetCursor
GetDesktopWindow
FillRect
ReleaseDC
GetDC
GetSystemMetrics
LoadImageW
GetParent
SetWindowLongW
GetWindowLongW
PtInRect
GetCursorPos
GetWindowRect
GetClientRect
gdi32
SelectObject
DeleteObject
DeleteDC
CreateCompatibleDC
BitBlt
ExtSelectClipRgn
CreateBitmap
StretchBlt
SetBkColor
SetDIBitsToDevice
GetDIBits
CreateDIBPatternBrushPt
CreateRectRgnIndirect
GetClipBox
StretchDIBits
RealizePalette
SaveDC
SetBrushOrgEx
CombineRgn
CreateRectRgn
GetObjectW
CreateCompatibleBitmap
CreateSolidBrush
CreatePen
LineTo
MoveToEx
RectVisible
Rectangle
CreateFontIndirectW
Ellipse
GetPixel
GetStockObject
SetBkMode
SetPixelV
SetROP2
SetStretchBltMode
SetTextColor
Polygon
PatBlt
CreateDIBSection
RestoreDC
GetDeviceCaps
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetValueExW
RegOpenKeyW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
BuildExplicitAccessWithNameW
SetSecurityInfo
GetSecurityInfo
SetEntriesInAclW
GetSecurityDescriptorSacl
GetSidSubAuthorityCount
GetSidSubAuthority
GetSidIdentifierAuthority
OpenThreadToken
IsTextUnicode
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
ConvertSidToStringSidW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
LookupAccountNameW
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
SHFileOperationW
ShellExecuteW
ole32
CoCreateInstance
CoCreateGuid
CoTaskMemFree
CoUninitialize
CoInitialize
oleaut32
VariantChangeType
VariantInit
GetErrorInfo
SysAllocString
SysFreeString
SetErrorInfo
CreateErrorInfo
VariantClear
shlwapi
PathFindFileNameW
PathFindExtensionW
PathFileExistsW
msimg32
AlphaBlend
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
wtsapi32
WTSQuerySessionInformationW
WTSFreeMemory
netapi32
Netbios
NetApiBufferFree
NetWkstaTransportEnum
ws2_32
htonl
ntohl
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 345KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE