Static task
static1
Behavioral task
behavioral1
Sample
14fff71897dd991f009322f284198222d9d27d913b8b0a2f2b61edd460084ee6.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
14fff71897dd991f009322f284198222d9d27d913b8b0a2f2b61edd460084ee6.exe
Resource
win10v2004-20230703-en
General
-
Target
14fff71897dd991f009322f284198222d9d27d913b8b0a2f2b61edd460084ee6
-
Size
14.9MB
-
MD5
57ed73c4016326f1bceced10de6d2a7f
-
SHA1
6b08f97297b3c83a12133df9fa3bb0536f207b71
-
SHA256
14fff71897dd991f009322f284198222d9d27d913b8b0a2f2b61edd460084ee6
-
SHA512
548a7e481e35848b8da02fb9d24b8e6f4bc7b70b8e4f37c5cc312183aed703827fe0819d41cba840603a88a0696e91a9f568678c588f88cf5d735a92b18a4d82
-
SSDEEP
393216:zCHvZSgFTGy9zOwnkCUOLH9J4ZG5FHNUwzOwnbYZ:eZTGy9qVCUOLHx5FHewqiYZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14fff71897dd991f009322f284198222d9d27d913b8b0a2f2b61edd460084ee6
Files
-
14fff71897dd991f009322f284198222d9d27d913b8b0a2f2b61edd460084ee6.exe windows x86
eb1cd128280c93a1c921738205a4d16d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProfileStringA
InterlockedExchange
TerminateProcess
GetACP
GetLocalTime
GetSystemTime
GetTimeZoneInformation
RaiseException
HeapFree
HeapAlloc
ExitProcess
GetCommandLineA
RtlUnwind
GetTickCount
GetCurrentDirectoryA
GetFileTime
GetFileSize
GetFileAttributesA
SizeofResource
GetOEMCP
GetCPInfo
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GlobalFlags
GetProcessVersion
FindNextFileA
WritePrivateProfileStringA
GetCurrentThread
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageA
LocalFree
GlobalReAlloc
GlobalAlloc
lstrcmpA
GetThreadLocale
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
GlobalFree
MulDiv
SetLastError
FindResourceA
LoadResource
LockResource
GetCurrentThreadId
lstrcmpiA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GlobalLock
lstrcpynA
GlobalUnlock
GlobalGetAtomNameA
GlobalAddAtomA
GetVersion
lstrcpyA
lstrlenA
lstrcatA
GetLastError
GetLogicalDriveStringsA
Sleep
WideCharToMultiByte
GetStartupInfoA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FreeLibrary
LCMapStringA
CopyFileA
user32
ScreenToClient
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
MessageBoxA
IsChild
RegisterClassA
GetWindowTextLengthA
GetWindowTextA
DestroyWindow
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetLastActivePopup
IsWindowVisible
IsIconic
GetFocus
EqualRect
DispatchMessageA
GetDlgItem
InvalidateRect
GetKeyState
GetDlgCtrlID
UnpackDDElParam
SetActiveWindow
WinHelpA
SetMenu
LoadIconA
GetClassInfoA
DestroyMenu
SetFocus
ShowWindow
GetDesktopWindow
GetWindow
IsWindowEnabled
SetCursor
PeekMessageA
PostMessageA
GetCapture
ReleaseCapture
SetRectEmpty
SendMessageA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
LoadCursorA
RegisterWindowMessageA
GetActiveWindow
GetParent
GetMenuItemID
AdjustWindowRectEx
RedrawWindow
SetWindowPos
IsWindow
DefMDIChildProcA
DrawMenuBar
TranslateAcceleratorA
TranslateMDISysAccel
DefFrameProcA
CreateWindowExA
GetSysColor
MapWindowPoints
SendDlgItemMessageA
CopyRect
BringWindowToTop
GetMenu
GetMenuItemCount
GetSubMenu
wsprintfA
GetWindowLongA
SetWindowLongA
LoadMenuA
LoadAcceleratorsA
UpdateWindow
IsDialogMessageA
SetWindowTextA
MoveWindow
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
PostThreadMessageA
RegisterClipboardFormatA
LockWindowUpdate
GetDCEx
InvertRect
SetCapture
WindowFromPoint
KillTimer
SetTimer
MessageBeep
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
CharNextA
InflateRect
LoadStringA
GetClassNameA
GetSysColorBrush
GetSystemMenu
EnableWindow
DeleteMenu
AppendMenuA
SetParent
PtInRect
IsZoomed
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
SetMenuItemBitmaps
PostQuitMessage
IsRectEmpty
FillRect
FindWindowA
CharUpperA
EndDialog
CreateDialogIndirectParamA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
GetClientRect
ReuseDDElParam
ModifyMenuA
ShowOwnedPopups
gdi32
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
IntersectClipRect
SetTextAlign
DeleteObject
CreateRectRgn
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
SetWindowExtEx
CreateSolidBrush
CreatePatternBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
CreateRectRgnIndirect
LPtoDP
DPtoLP
GetTextExtentPoint32A
GetTextMetricsA
StretchDIBits
CreateCompatibleDC
CreateCompatibleBitmap
GetCharWidthA
CreateFontA
CreateFontIndirectA
GetMapMode
SetRectRgn
CombineRgn
GetTextColor
GetBkColor
BitBlt
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateDIBitmap
GetTextExtentPointA
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
shell32
DragQueryFileA
DragFinish
ShellExecuteA
comctl32
ord17
ImageList_Destroy
odbc32
ord10
ord16
ord61
ord13
ord18
ord11
ord3
ord14
ord9
ord15
ord51
ord45
ord50
ord1
ord2
ord41
ord43
ord68
ord12
ord46
ord19
ord44
ord8
ord59
ord17
ord20
ord49
ord48
ord5
oledlg
ord8
ole32
CoTaskMemAlloc
CoTaskMemFree
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CreateILockBytesOnHGlobal
olepro32
ord253
oleaut32
SysStringLen
VariantTimeToSystemTime
VariantChangeType
SysAllocStringByteLen
SysAllocString
VariantCopy
VariantClear
SysAllocStringLen
SysFreeString
wininet
InternetReadFile
FtpOpenFileA
InternetConnectA
InternetOpenA
FtpGetFileSize
InternetCrackUrlA
InternetCloseHandle
Sections
.text Size: 324KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14.5MB - Virtual size: 14.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ