Static task
static1
Behavioral task
behavioral1
Sample
6dc1503f618c70cfe554f9b96271ff7c056f5ef01a99e88750e251ede8e14e81.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6dc1503f618c70cfe554f9b96271ff7c056f5ef01a99e88750e251ede8e14e81.exe
Resource
win10v2004-20230703-en
General
-
Target
6dc1503f618c70cfe554f9b96271ff7c056f5ef01a99e88750e251ede8e14e81
-
Size
3.8MB
-
MD5
438fc871895c84a060e70acd80fd341d
-
SHA1
d5f2fe483a0665149ca43a5a200bcb9e052ef346
-
SHA256
6dc1503f618c70cfe554f9b96271ff7c056f5ef01a99e88750e251ede8e14e81
-
SHA512
1c885c868c20ea006cb28b373996c8b546ea9f332d943ed20032ff89f653f75cabe54976bba93ac0eb4d42849da7e227e1a9237bea4a338bb3b4f8217ed06b60
-
SSDEEP
49152:HFnURrOSgPREAdSjAbDiY1pIk4AV1hc6rssgcFbxau2oR9sXafgkDFMVR9C1UhPX:HFnwaSg3dS81p/4yc6fbahzBiCV2Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6dc1503f618c70cfe554f9b96271ff7c056f5ef01a99e88750e251ede8e14e81
Files
-
6dc1503f618c70cfe554f9b96271ff7c056f5ef01a99e88750e251ede8e14e81.exe windows x86
2bb1d907fe543d027ab611cb4cb31fb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
GetFileAttributesExW
FindFirstFileExW
DecodePointer
FindResourceExW
InitializeCriticalSectionAndSpinCount
RaiseException
WritePrivateProfileStringA
WritePrivateProfileStringW
LockResource
SizeofResource
FreeResource
LoadResource
FindResourceW
GetTickCount
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetVolumeInformationW
GetDiskFreeSpaceExW
GetCurrentProcess
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalAlloc
GlobalUnlock
GlobalLock
SetEndOfFile
WriteConsoleW
SetStdHandle
LCMapStringW
GetLocalTime
CreateMutexW
GetVersionExW
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetStartupInfoW
Sleep
GetModuleHandleW
TerminateProcess
OpenProcess
CreateProcessW
GetStdHandle
GetExitCodeProcess
SetFilePointer
WriteFile
DuplicateHandle
GetDriveTypeW
GetProcAddress
LoadLibraryW
GetModuleFileNameW
FindClose
DeleteFileW
FindNextFileW
FindFirstFileW
MoveFileExW
GetFileSize
GetFileSizeEx
CreateFileW
SetEvent
CloseHandle
TerminateThread
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeW
GetConsoleCP
GetFileType
ReadConsoleW
GetConsoleMode
SetFilePointerEx
UnregisterWaitEx
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
GetOEMCP
IsValidCodePage
GetModuleHandleExW
GetCPInfo
CreateSemaphoreW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCommandLineW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetThreadPriority
ReadFile
DeviceIoControl
WaitForSingleObject
GetLastError
CreateEventW
GetLogicalDriveStringsW
SetLastError
HeapSize
HeapReAlloc
FreeLibrary
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentThread
GetACP
ExitProcess
MulDiv
GetCurrentProcessId
EncodePointer
CreateThread
ExitThread
LoadLibraryExW
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwind
CreateTimerQueue
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
user32
SetWindowPos
BringWindowToTop
SetForegroundWindow
GetDC
ReleaseDC
ShowWindow
GetWindowLongW
SendMessageW
IsIconic
GetSystemMetrics
KillTimer
SetTimer
GetWindowRect
MoveWindow
MonitorFromWindow
GetMonitorInfoW
EnableWindow
ClientToScreen
GetPropW
SetPropW
wvsprintfW
SetCursor
UnionRect
OffsetRect
LoadCursorW
GetMessageW
TranslateMessage
DispatchMessageW
CallWindowProcW
RegisterClassExW
GetClassInfoExW
IsWindow
SetFocus
GetClientRect
GetParent
GetWindow
LoadImageW
IsWindowVisible
CharNextW
GetActiveWindow
GetFocus
GetKeyState
SetCapture
ReleaseCapture
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
ScreenToClient
MapWindowPoints
IntersectRect
IsRectEmpty
IsZoomed
SetWindowRgn
GetWindowTextW
GetWindowTextLengthW
GetCaretBlinkTime
GetCaretPos
CharPrevW
DrawTextW
FillRect
SetRect
HideCaret
ShowCaret
SetCaretPos
CreateCaret
GetSysColor
CreateAcceleratorTableW
InvalidateRgn
GetGUIThreadInfo
FindWindowExW
RegisterClassW
wsprintfW
SetWindowTextW
PostQuitMessage
CloseWindow
MessageBoxW
DestroyWindow
SetWindowLongW
CreateWindowExW
PostMessageW
DefWindowProcW
PtInRect
GetCursorPos
gdi32
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
GetObjectW
DeleteDC
GetDeviceCaps
CreateFontIndirectW
CreatePen
Rectangle
RestoreDC
SaveDC
GetTextMetricsW
SetWindowOrgEx
CreateRoundRectRgn
GetObjectA
CreatePatternBrush
CreateSolidBrush
SetBkMode
SetTextColor
CombineRgn
CreatePenIndirect
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
GetTextExtentPoint32W
LineTo
RoundRect
SelectClipRgn
ExtSelectClipRgn
SetBkColor
StretchBlt
SetStretchBltMode
CreateDIBSection
MoveToEx
TextOutW
ExtTextOutW
GdiFlush
advapi32
RegCloseKey
RegDeleteValueW
RegOpenKeyW
RegCreateKeyW
RegQueryValueExW
DuplicateTokenEx
OpenProcessToken
shell32
ord165
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoTaskMemFree
CreateStreamOnHGlobal
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CoUninitialize
CoInitialize
CoCreateInstance
shlwapi
PathFileExistsW
StrStrIA
PathIsRootW
ws2_32
gethostbyname
socket
setsockopt
closesocket
inet_addr
ntohs
WSAStartup
shutdown
recv
send
connect
wininet
HttpSendRequestExW
InternetConnectW
InternetOpenW
InternetCloseHandle
HttpOpenRequestW
HttpSendRequestW
InternetReadFile
HttpQueryInfoW
HttpEndRequestW
psapi
EnumProcessModules
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
comctl32
ord17
_TrackMouseEvent
imm32
ImmSetCompositionFontW
ImmReleaseContext
ImmGetContext
ImmGetVirtualKey
ImmSetCompositionWindow
oleaut32
SysFreeString
VariantClear
VariantInit
SysAllocString
gdiplus
GdiplusStartup
GdiplusShutdown
GdipCloneBrush
GdipDeleteBrush
GdipCreateLineBrushI
GdipCloneImage
GdipDisposeImage
GdipGetImageGraphicsContext
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetCompositingQuality
GdipAlloc
GdipSetPixelOffsetMode
GdipSetTextRenderingHint
GdipSetInterpolationMode
GdipGraphicsClear
GdipDrawImage
GdipDrawImageRectI
GdipDeleteFontFamily
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipGetFamily
GdipDrawString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipLoadImageFromStream
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipFree
GdipSetSmoothingMode
Sections
.text Size: 832KB - Virtual size: 831KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ