Static task
static1
Behavioral task
behavioral1
Sample
b41dcf1d5ec307238a14cf522851abca987fe5f61edad50c98533d771d22d193.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b41dcf1d5ec307238a14cf522851abca987fe5f61edad50c98533d771d22d193.exe
Resource
win10v2004-20230831-en
General
-
Target
b41dcf1d5ec307238a14cf522851abca987fe5f61edad50c98533d771d22d193
-
Size
1.9MB
-
MD5
ef161743e2c37676daaaa1af7829b827
-
SHA1
6a2a3aaf590cc34ee8a33b6fa9c43925c3b6ff5a
-
SHA256
b41dcf1d5ec307238a14cf522851abca987fe5f61edad50c98533d771d22d193
-
SHA512
a14c0857e651d4fc20c4f1c1d9de06d9b641f44c992e3191054a3baf0dc4b5efb27df3798b449009564e90ef4d7b10a104c5e997902e67bf00d0f1b561de9a77
-
SSDEEP
49152:lNd++Llb0HAGenfmojMac0qCpx3w5OMjUfkptVxp:jxlbO7EeojMac6TojUu5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b41dcf1d5ec307238a14cf522851abca987fe5f61edad50c98533d771d22d193
Files
-
b41dcf1d5ec307238a14cf522851abca987fe5f61edad50c98533d771d22d193.exe windows x86
9f25bda760b82a8c6af23c9fd11df950
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoGetClassObject
CoCreateInstance
CreateStreamOnHGlobal
CoCreateGuid
IIDFromString
CoInitialize
CoUninitialize
OleRun
OleSetContainedObject
OleLockRunning
OleUninitialize
OleInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
StringFromGUID2
CLSIDFromProgID
CLSIDFromString
shell32
FindExecutableA
CommandLineToArgvW
SHGetFolderPathA
SHBrowseForFolderA
SHGetFolderLocation
SHGetPathFromIDListA
SHGetFolderPathW
wininet
HttpOpenRequestA
InternetReadFile
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetCrackUrlA
HttpSendRequestA
InternetErrorDlg
HttpQueryInfoA
user32
GetAncestor
PostQuitMessage
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowLongW
GetWindowLongW
AdjustWindowRectEx
EnableMenuItem
GetSystemMenu
ShowWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
DefWindowProcW
GetTopWindow
SetWindowTextW
KillTimer
SetTimer
SetRect
MapDialogRect
PtInRect
GetCursorPos
SetCursor
SetWindowContextHelpId
GetWindowRect
SetForegroundWindow
EnableWindow
GetDlgCtrlID
MessageBoxW
LoadCursorA
GetWindow
GetClassNameA
GetParent
GetDesktopWindow
SetWindowLongA
GetWindowLongA
FillRect
GetSysColor
GetMessageW
GetWindowThreadProcessId
DrawTextW
GetWindowTextW
MapWindowPoints
PostMessageA
EnumWindows
DialogBoxIndirectParamA
ClientToScreen
MessageBoxA
GetClientRect
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
RedrawWindow
InvalidateRgn
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
DestroyAcceleratorTable
CreateAcceleratorTableA
ReleaseCapture
SetCapture
GetFocus
GetDlgItem
CharNextA
wsprintfA
RegisterWindowMessageA
DispatchMessageW
PeekMessageA
MsgWaitForMultipleObjectsEx
IsWindowUnicode
SetWindowPos
LoadStringA
EndDialog
ScreenToClient
SendMessageA
DefWindowProcA
CallWindowProcA
UnregisterClassA
RegisterClassExA
GetClassInfoExA
CreateWindowExA
IsWindow
IsChild
DestroyWindow
GetActiveWindow
SetFocus
MoveWindow
urlmon
IsValidURL
comctl32
InitCommonControlsEx
wintrust
WinVerifyTrust
kernel32
GetSystemTimeAsFileTime
GetModuleHandleW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringEx
InitializeCriticalSectionEx
GetStringTypeW
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemInfo
VirtualProtect
VirtualQuery
GetStdHandle
GetFileType
GetModuleFileNameW
WriteConsoleW
GetConsoleOutputCP
GetConsoleMode
CreateThread
ExitThread
FreeLibraryAndExitThread
HeapFree
HeapAlloc
EncodePointer
InitializeCriticalSection
CreateFileW
CreateMutexA
ReleaseMutex
LoadLibraryW
GetModuleHandleExA
OpenFileMappingA
CreateFileMappingA
UnmapViewOfFile
FlushViewOfFile
DeleteFileW
GetDriveTypeW
GetFullPathNameW
CreateDirectoryW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
SetStdHandle
HeapSize
HeapReAlloc
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesW
ReadConsoleW
FlushFileBuffers
GetFileSizeEx
GetCurrentDirectoryW
GetTimeZoneInformation
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
MapViewOfFile
OutputDebugStringW
IsDebuggerPresent
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
GetProcessHeap
MoveFileExA
InterlockedPushEntrySList
InterlockedPopEntrySList
GetCommandLineA
GetCommandLineW
DecodePointer
RaiseException
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentThreadId
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryExA
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalHandle
GlobalFree
MulDiv
lstrcmpA
lstrcmpiA
lstrcpyA
FindResourceA
SetDllDirectoryA
MultiByteToWideChar
WideCharToMultiByte
IsDBCSLeadByte
FindResourceW
LocalFree
CreateFileA
DeleteFileA
ReadFile
CloseHandle
lstrcpynA
lstrlenA
GetTempPathA
lstrcatA
CreateDirectoryA
WriteFile
GetSystemDirectoryA
MoveFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
LocalAlloc
FormatMessageA
Sleep
GetUserDefaultLCID
SetEvent
CreateEventA
FileTimeToSystemTime
SystemTimeToFileTime
GetCurrentProcessId
GetLocalTime
FormatMessageW
FindClose
FindFirstFileA
FindNextFileA
GetDriveTypeA
GetFileAttributesA
RemoveDirectoryA
SetFileAttributesA
GetTickCount
CreateProcessA
WaitForSingleObject
ExitProcess
TerminateProcess
OpenProcess
GetWindowsDirectoryA
GetLocaleInfoA
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
QueryPerformanceCounter
QueryPerformanceFrequency
SetEndOfFile
SetFilePointerEx
GetCurrentProcess
GetLogicalProcessorInformation
GetNativeSystemInfo
GetSystemWow64DirectoryA
GetModuleHandleExW
LoadLibraryExW
OpenMutexA
GetSystemTime
OpenThread
GetExitCodeThread
SetHandleInformation
CreatePipe
PeekNamedPipe
GetExitCodeProcess
InitializeSListHead
advapi32
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegQueryValueExA
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
RegEnumKeyA
OpenProcessToken
CopySid
ConvertStringSecurityDescriptorToSecurityDescriptorA
ConvertSidToStringSidA
oleaut32
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
VariantInit
VariantClear
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantCopy
VariantChangeType
SysStringByteLen
SysAllocStringByteLen
GetErrorInfo
shlwapi
SHDeleteKeyA
PathIsDirectoryEmptyA
PathAppendA
ord12
gdi32
DeleteObject
GetDeviceCaps
GetStockObject
DeleteDC
GetObjectA
SetBkMode
SetTextColor
CreateFontIndirectA
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
crypt32
CryptBinaryToStringA
CryptStringToBinaryA
CryptUnprotectData
CryptProtectData
version
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
msi
ord159
ord204
ord44
ord115
ord117
ord91
ord158
ord160
ord8
ord31
ord189
ord87
ord67
ord168
ord137
ord141
Sections
.text Size: 701KB - Virtual size: 700KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 946KB - Virtual size: 945KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ