Static task
static1
Behavioral task
behavioral1
Sample
709ab96ecdefc6f4acace3e75aa2ae9bde0cd9e80b769d5471dd098adfb15a0b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
709ab96ecdefc6f4acace3e75aa2ae9bde0cd9e80b769d5471dd098adfb15a0b.exe
Resource
win10v2004-20230831-en
General
-
Target
709ab96ecdefc6f4acace3e75aa2ae9bde0cd9e80b769d5471dd098adfb15a0b
-
Size
2.8MB
-
MD5
bf021abe3d0fbb9d82fc4fedac2e14e1
-
SHA1
4ce4d19ecfa7288ad6d23c140812ab77a1654bc7
-
SHA256
709ab96ecdefc6f4acace3e75aa2ae9bde0cd9e80b769d5471dd098adfb15a0b
-
SHA512
a3b5e41381f9b476f0c8eb2b0494238c1e7a1634f20c546c0a40ddce9c254d5b03098332ba9b9b62b25bb96b73d0f84f0db01a901839942e61570af4814265f0
-
SSDEEP
49152:B1skDMsDohOKD2OsDRIO9Yf99EN9YGKiVORYIV4rQwHZ:pDzDowsviVQbV4x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 709ab96ecdefc6f4acace3e75aa2ae9bde0cd9e80b769d5471dd098adfb15a0b
Files
-
709ab96ecdefc6f4acace3e75aa2ae9bde0cd9e80b769d5471dd098adfb15a0b.exe windows x64
420f301e0c101a6f10c8c5146bb2b986
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GlobalFree
GetOverlappedResult
CreateNamedPipeW
SetNamedPipeHandleState
DisconnectNamedPipe
ConnectNamedPipe
CreateFileW
ReleaseMutex
ResetEvent
WinExec
GetBinaryTypeW
FindNextFileW
FindClose
ExpandEnvironmentStringsW
CreateThread
WritePrivateProfileStructW
GetPrivateProfileStructW
WritePrivateProfileStringW
GetPrivateProfileIntW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
MoveFileExW
GetPrivateProfileStringW
lstrcpyW
GlobalLock
GlobalUnlock
GlobalAlloc
GetTickCount
GetVersion
GetCurrentThread
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetStdHandle
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
TerminateProcess
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetModuleHandleExW
ExitThread
GetFileAttributesExW
RtlPcToFileHeader
RtlUnwindEx
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
SuspendThread
SetThreadContext
GetThreadContext
VirtualQuery
FlushFileBuffers
GetFileType
GetStdHandle
GetSystemWindowsDirectoryW
lstrcmpiA
lstrcmpA
GetCommandLineW
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
Sleep
GetTempPathW
WriteFile
SetFileAttributesW
SetFileAttributesA
SetEndOfFile
ReadFile
GetFileSize
GetFileAttributesA
CreateFileA
WideCharToMultiByte
lstrlenW
lstrcpynW
FreeLibrary
WaitForMultipleObjects
CreateEventW
SetEvent
IsBadReadPtr
GetModuleFileNameW
VirtualProtect
GetCurrentThreadId
GetCurrentProcessId
WaitForSingleObject
SetUnhandledExceptionFilter
OutputDebugStringW
MultiByteToWideChar
LoadLibraryW
FindResourceW
SizeofResource
LockResource
LoadResource
GetProcAddress
GetModuleHandleW
FindResourceExW
GetSystemDirectoryW
GetTempFileNameW
GetLocalTime
ResumeThread
lstrcmpW
FreeResource
ExitProcess
MulDiv
GetACP
LocalFree
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
GetExitCodeThread
SwitchToThread
WaitForSingleObjectEx
DuplicateHandle
TryEnterCriticalSection
FormatMessageW
GetStringTypeW
SetFilePointer
GetFileSizeEx
OpenFileMappingW
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
GetVersionExW
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
DeviceIoControl
GetStartupInfoW
CreateProcessW
GetCurrentProcess
CreateMutexW
CloseHandle
DeleteFileW
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
GetTimeZoneInformation
DecodePointer
RtlUnwind
user32
PostQuitMessage
ShowWindow
EnableWindow
GetWindow
GetAsyncKeyState
keybd_event
GetMenuStringW
GetMessageW
PtInRect
MapWindowPoints
ScreenToClient
ClientToScreen
DispatchMessageW
GetClientRect
KillTimer
SetTimer
GetFocus
SetFocus
DestroyWindow
SendMessageW
GetMonitorInfoW
MonitorFromPoint
GetParent
CopyRect
GetCursorPos
ReleaseCapture
GetWindowRect
SetCapture
MoveWindow
FindWindowW
IsWindow
SetWindowPos
UnregisterClassW
PostMessageW
RegisterWindowMessageW
TranslateMessage
CreatePopupMenu
FindWindowExW
GetActiveWindow
IsClipboardFormatAvailable
EnumThreadWindows
ChangeWindowMessageFilter
ClipCursor
IsWindowEnabled
GetKeyState
AddClipboardFormatListener
IsIconic
IsWindowVisible
SetWindowPlacement
GetWindowPlacement
UnregisterHotKey
RegisterHotKey
SetWindowLongW
OffsetRect
FrameRect
FillRect
GetCaretPos
SetCaretPos
InvalidateRect
EndPaint
BeginPaint
GetWindowDC
DrawTextW
CallWindowProcW
IsZoomed
MapVirtualKeyW
GetKeyNameTextW
MessageBoxExW
SetWindowTextW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetClassNameW
SetWindowLongPtrW
GetWindowLongPtrW
WindowFromPoint
MsgWaitForMultipleObjects
CreateWindowExW
RegisterClassExW
GetDoubleClickTime
DefWindowProcW
PeekMessageW
EnumDisplayMonitors
MonitorFromWindow
MonitorFromRect
DestroyMenu
DrawIconEx
DestroyIcon
GetWindowThreadProcessId
GetWindowLongW
IntersectRect
ReleaseDC
GetDC
SetForegroundWindow
GetForegroundWindow
InsertMenuItemW
EmptyClipboard
RegisterClipboardFormatW
GetClipboardData
SetClipboardData
CloseClipboard
OpenClipboard
wsprintfW
wvsprintfW
SetCursor
InflateRect
UnionRect
LoadCursorW
IsChild
UpdateLayeredWindow
CharNextW
GetUpdateRect
CreateCaret
GetCaretBlinkTime
IsRectEmpty
RegisterClassW
GetClassInfoExW
GetSystemMetrics
SetPropW
GetPropW
LoadImageW
SystemParametersInfoW
SetWindowRgn
MessageBoxW
GetWindowTextW
GetWindowTextLengthW
RemovePropW
CharPrevW
SetRect
HideCaret
ShowCaret
GetSysColor
CreateAcceleratorTableW
InvalidateRgn
BringWindowToTop
AttachThreadInput
GetAncestor
TrackPopupMenuEx
DeleteMenu
GetMenuItemCount
GetIconInfo
gdi32
Rectangle
RestoreDC
SaveDC
GetTextMetricsW
SetWindowOrgEx
CreateRoundRectRgn
CombineRgn
CreateRectRgnIndirect
CreateFontIndirectW
GetClipBox
SelectClipRgn
ExtSelectClipRgn
StretchBlt
SetStretchBltMode
SetDIBColorTable
TextOutW
GetDIBits
SetDIBitsToDevice
GetDeviceCaps
CreatePen
BitBlt
CreateCompatibleBitmap
DeleteObject
CreateCompatibleDC
SelectObject
GetTextExtentPoint32W
DeleteDC
GetStockObject
SetBkColor
SetBkMode
SetTextColor
ExtTextOutW
CreateDIBSection
GetObjectW
GetCharABCWidthsW
CreateDCW
CreateSolidBrush
advapi32
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegCreateKeyW
RegGetValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
GetTokenInformation
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
SHGetKnownFolderItem
ord155
SHBrowseForFolderW
SHGetIDListFromObject
ord727
DragQueryFileW
ShellExecuteW
SHGetFileInfoW
SHCreateItemFromIDList
SHCreateItemFromParsingName
ord18
DragFinish
ord190
ord152
SHParseDisplayName
SHBindToParent
ord21
SHCreateShellItemArrayFromShellItem
ShellExecuteExW
ord25
SHGetPathFromIDListW
ord165
SHGetSpecialFolderPathW
ord68
SHGetDesktopFolder
ole32
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
OleInitialize
OleUninitialize
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CoCreateGuid
ReleaseStgMedium
CoLockObjectExternal
RegisterDragDrop
RevokeDragDrop
DoDragDrop
OleSetClipboard
OleGetClipboard
oleaut32
SysFreeString
SysAllocString
VariantClear
VariantInit
SafeArrayCreate
SafeArrayPutElement
shlwapi
PathFindFileNameW
PathFindExtensionW
StrCmpIW
ord158
ord219
StrStrIW
StrRetToBufW
StrRetToStrW
wnsprintfW
PathRemoveFileSpecW
PathIsDirectoryW
PathFileExistsW
PathCombineW
PathAppendW
ord176
StrCpyW
ord172
ord174
StrStrIA
SHAutoComplete
SHGetValueA
SHSetValueA
StrCmpNIW
StrTrimA
urlmon
URLDownloadToFileW
URLDownloadToCacheFileW
gdiplus
GdipLoadImageFromStreamICM
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipAddPathArc
GdipDrawImageRectRectI
GdipDrawImagePointsI
GdipFillPath
GdipGraphicsClear
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipGetImagePixelFormat
GdipCreateHBITMAPFromBitmap
GdipGetPropertyItemSize
GdipGetPropertyItem
GdiplusStartup
GdipAlloc
GdipFree
GdiplusShutdown
GdipDrawImageRectI
GdipLoadImageFromFile
GdipCreateBitmapFromStream
GdipCreateTexture
GdipClosePathFigure
GdipFillEllipseI
GdipCloneBitmapAreaI
GdipDrawEllipseI
GdipCloneImage
GdipDisposeImage
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipDrawImageRectRect
GdipSetInterpolationMode
GdipSetSmoothingMode
GdipDeleteGraphics
GdipBitmapSetPixel
GdipCreateBitmapFromScan0
GdipCreateBitmapFromFile
GdipGetImageHeight
GdipGetImageWidth
GdipSaveImageToFile
GdipDrawPath
GdipCreatePath
GdipDeletePath
GdipAddPathLineI
GdipAddPathArcI
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipSetPenDashStyle
GdipCreateFromHDC
GdipDrawLineI
GdipDrawRectangleI
GdipGetImageGraphicsContext
imm32
ImmAssociateContext
propsys
InitVariantFromBuffer
comctl32
ord412
ord413
ImageList_Destroy
ImageList_DrawEx
ord17
_TrackMouseEvent
InitCommonControlsEx
ord410
msimg32
AlphaBlend
GradientFill
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
crypt32
CertGetNameStringW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 664KB - Virtual size: 663KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ