Static task
static1
Behavioral task
behavioral1
Sample
0220bd3abbb3dccbd5546c02d27ef2c0d07bcb7e5b31db3a37f7861599284a83.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0220bd3abbb3dccbd5546c02d27ef2c0d07bcb7e5b31db3a37f7861599284a83.exe
Resource
win10v2004-20230703-en
General
-
Target
0220bd3abbb3dccbd5546c02d27ef2c0d07bcb7e5b31db3a37f7861599284a83
-
Size
1.5MB
-
MD5
978f45b1188f7bd6314d3fa587098cc7
-
SHA1
6e6666f473601ceee7b00cfb21ccd3f81358a27c
-
SHA256
0220bd3abbb3dccbd5546c02d27ef2c0d07bcb7e5b31db3a37f7861599284a83
-
SHA512
ff6a95f3fd34dad5212d11474fcdb0a751816a73b77b92563cb84602662f047fc13d23c6ec09cccdf49c4be5988d8fab066ba8d5b61b705719f376e8449dd796
-
SSDEEP
24576:uqcsnzNK+vub//m36oe88vsUdNFazDp6qGyWUN5IeYyZ2z:XD6b//m36oedvsUr/VFK9nC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0220bd3abbb3dccbd5546c02d27ef2c0d07bcb7e5b31db3a37f7861599284a83
Files
-
0220bd3abbb3dccbd5546c02d27ef2c0d07bcb7e5b31db3a37f7861599284a83.exe windows x86
6a58971a759a492235b8db72634482a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dxwnd
ord7
ord14
ord8
ord3
ord11
ord9
ord2
ord1
ord12
ord6
ord13
ord5
ord4
shlwapi
PathFindExtensionA
PathFindFileNameA
PathRemoveFileSpecW
PathStripToRootA
PathIsUNCA
PathRemoveFileSpecA
kernel32
MoveFileA
GetStringTypeExA
GetThreadLocale
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
FileTimeToSystemTime
SystemTimeToFileTime
GlobalFlags
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
GetModuleHandleW
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetFileSizeEx
SetErrorMode
RtlUnwind
RaiseException
ExitProcess
GetDiskFreeSpaceA
HeapAlloc
GetSystemTimeAsFileTime
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCommandLineA
GetStartupInfoA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapSize
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
SetEnvironmentVariableW
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
GetProcessHeap
GetTempFileNameA
GetFileTime
SetFileTime
InterlockedDecrement
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetCurrentProcessId
GlobalSize
FormatMessageA
lstrlenW
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetFileAttributesA
EnumSystemCodePagesA
GetCPInfoExA
GetVersion
SetFilePointer
FreeResource
GlobalFree
MulDiv
SetEvent
ResetEvent
CreateSemaphoreA
CreateEventA
OpenEventA
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
GetThreadContext
FindNextFileA
GetEnvironmentVariableA
SetEnvironmentVariableA
WaitForSingleObject
WaitForDebugEvent
GetFullPathNameA
ReadProcessMemory
ContinueDebugEvent
DebugSetProcessKillOnExit
DebugActiveProcessStop
GetFileSize
CreateFileMappingA
MapViewOfFile
GetLogicalDriveStringsA
QueryDosDeviceA
UnmapViewOfFile
FindFirstFileA
FindClose
lstrlenA
MultiByteToWideChar
lstrcpyA
CreateMailslotA
GetTempPathA
FreeLibrary
TerminateProcess
lstrcmpiA
GetShortPathNameA
GetLongPathNameA
CopyFileA
SetLastError
DeleteFileA
CreateThread
GlobalAlloc
GlobalLock
GlobalUnlock
GetTickCount
ReadFile
Thread32First
OpenThread
ResumeThread
SuspendThread
Thread32Next
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
Sleep
OpenSemaphoreA
GetDriveTypeA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetUserDefaultUILanguage
CreateFileA
WriteFile
LocalAlloc
LocalFree
GetCurrentProcess
GetVersionExA
GetLastError
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetModuleHandleA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetModuleFileNameA
LoadLibraryA
GetProcAddress
CloseHandle
HeapReAlloc
user32
GrayStringA
BeginPaint
EndPaint
PostQuitMessage
ValidateRect
TranslateMessage
ShowOwnedPopups
InflateRect
GetMenuItemInfoA
CharUpperA
IsClipboardFormatAvailable
GetSysColorBrush
CharNextA
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
DrawTextExA
DrawTextA
TabbedTextOutA
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
TranslateAcceleratorA
SetWindowContextHelpId
MapDialogRect
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
IntersectRect
IsIconic
GetWindowPlacement
GetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
LoadStringA
SetCursor
ShowCursor
GetMessageA
WindowFromPoint
OffsetRect
ReleaseCapture
SetCapture
GetWindowDC
RegisterWindowMessageA
DrawAnimatedRects
EnumChildWindows
GetClassNameA
TrackPopupMenu
SetMenuDefaultItem
IsWindow
SetForegroundWindow
SetParent
SetActiveWindow
RedrawWindow
GetMenuItemID
SetSystemCursor
LoadCursorA
CopyIcon
DestroyCursor
GetKeyState
GetIconInfo
SetRect
CopyRect
FillRect
GetCursorPos
WindowFromDC
LoadStringW
MessageBoxExW
GetSystemMetrics
AdjustWindowRect
ReleaseDC
MessageBeep
EnumWindows
GetWindowThreadProcessId
GetWindow
GetClipboardData
DestroyMenu
LoadImageA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
ClipCursor
UnregisterHotKey
RegisterHotKey
GetAncestor
ClientToScreen
LoadMenuA
GetSubMenu
GetMenuState
EnableMenuItem
CheckMenuItem
LoadBitmapA
SetSysColors
EnumDisplayDevicesA
PostMessageA
EnumDisplaySettingsA
ChangeDisplaySettingsA
GetSysColor
UpdateWindow
GetClientRect
GetParent
GetDC
GetDesktopWindow
SetMenu
GetMenu
SystemParametersInfoA
InvalidateRect
GetWindowRect
FindWindowA
MonitorFromWindow
IsWindowVisible
LoadIconA
DestroyIcon
SendMessageA
EnableWindow
KillTimer
SetTimer
MessageBoxExA
MessageBoxA
EndDialog
gdi32
ExtSelectClipRgn
CreatePatternBrush
SelectPalette
Escape
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
CreateFontIndirectA
ExtTextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
GetPixel
CreateFontA
SelectObject
GetTextExtentPoint32A
TextOutA
SetDeviceGammaRamp
GetDeviceGammaRamp
DeleteObject
SetDIBitsToDevice
StretchDIBits
CreatePalette
GetDeviceCaps
GetPixelFormat
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
DescribePixelFormat
SetMapMode
SetStretchBltMode
SetBkMode
RestoreDC
SaveDC
CopyMetaFileA
CreateRectRgnIndirect
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
Ellipse
CreatePen
GetStockObject
Rectangle
GetBitmapBits
GetObjectA
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
BitBlt
SetViewportOrgEx
comdlg32
ChooseColorA
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
OpenProcessToken
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegSetValueA
RegCloseKey
GetTokenInformation
DuplicateToken
CreateWellKnownSid
CheckTokenMembership
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
shell32
SHGetFileInfoA
DragQueryPoint
SHAppBarMessage
Shell_NotifyIconA
ExtractIconA
SHChangeNotify
DragAcceptFiles
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
ShellExecuteExA
DragQueryFileA
DragFinish
comctl32
ImageList_Create
oledlg
ord8
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
CLSIDFromString
CLSIDFromProgID
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
OleGetClipboard
CreateStreamOnHGlobal
GetHGlobalFromStream
CoTaskMemFree
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
oleaut32
SafeArrayDestroy
SysAllocString
OleCreateFontIndirect
OleLoadPicture
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
OleCreatePictureIndirect
VarDateFromStr
SysAllocStringByteLen
SysFreeString
SysStringLen
Sections
.text Size: 486KB - Virtual size: 486KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 899KB - Virtual size: 899KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ