Static task
static1
Behavioral task
behavioral1
Sample
b9d0db1c6695858f16b7467e2796d2ee2110cde166b0f239245d9392bbe6714e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b9d0db1c6695858f16b7467e2796d2ee2110cde166b0f239245d9392bbe6714e.exe
Resource
win10v2004-20230915-en
General
-
Target
b9d0db1c6695858f16b7467e2796d2ee2110cde166b0f239245d9392bbe6714e
-
Size
2.0MB
-
MD5
69403c9f68ae7ac49626af54fc6f9181
-
SHA1
b8ca95ef47167fe59e2efd8362b38efcdd7ea64f
-
SHA256
b9d0db1c6695858f16b7467e2796d2ee2110cde166b0f239245d9392bbe6714e
-
SHA512
6d2977840974c5e34d8c85b139ac86d4858add84cc682986437a4c068099f8e0656764a4df12645672b15a3e8898a1b3f47906560cd0264f0f7cad6b99628b23
-
SSDEEP
24576:0xD1GUcGGnwbJRT/nK3ltwzLEH7CpGr5GTljFz0qFU6aS8:0xoVojSVGzwbC01GDz1FU6Z8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9d0db1c6695858f16b7467e2796d2ee2110cde166b0f239245d9392bbe6714e
Files
-
b9d0db1c6695858f16b7467e2796d2ee2110cde166b0f239245d9392bbe6714e.exe windows x64
e2c523314a0133b6ab05abd0bc9e6dc8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetStartupInfoW
RtlUnwindEx
HeapReAlloc
RtlLookupFunctionEntry
RaiseException
RtlPcToFileHeader
Sleep
ExitProcess
HeapQueryInformation
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetStdHandle
CreateFileA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetErrorMode
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringW
lstrlenA
TlsFree
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
TlsGetValue
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GlobalFlags
GlobalGetAtomNameW
FreeResource
GlobalFindAtomW
GetVersionExW
CompareStringW
GetVersionExA
GlobalAddAtomW
CloseHandle
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
lstrcmpW
WideCharToMultiByte
MultiByteToWideChar
GlobalFree
GlobalAlloc
FormatMessageW
LocalFree
lstrlenW
GetCurrentProcessId
GetModuleFileNameW
GlobalLock
GlobalUnlock
GetModuleHandleA
MulDiv
GetLastError
GetModuleHandleW
LoadLibraryW
FindResourceW
LoadResource
LockResource
SizeofResource
GetNativeSystemInfo
HeapAlloc
GetProcessHeap
HeapFree
VirtualFree
VirtualProtect
LoadLibraryA
SetLastError
GetProcAddress
FreeLibrary
GetTickCount
VirtualAlloc
user32
SetTimer
KillTimer
WindowFromPoint
GetDCEx
LockWindowUpdate
SetCapture
TrackPopupMenu
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
DeferWindowPos
CallWindowProcW
PtInRect
GetMenu
OffsetRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
SetWindowPos
SetFocus
ShowWindow
SetWindowLongW
GetDlgCtrlID
IsWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemInt
SendDlgItemMessageW
GetDlgItem
GetWindow
UnhookWindowsHookEx
ShowOwnedPopups
SetRect
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
EnableMenuItem
CheckMenuItem
PostMessageW
PostQuitMessage
GetMenuState
AppendMenuW
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
GetWindowLongW
GetParent
GetLastActivePopup
IsWindowEnabled
MessageBoxW
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
GrayStringW
DrawTextExW
DrawTextW
LoadCursorW
LoadIconW
GetSystemMetrics
TabbedTextOutW
FillRect
GetDC
ReleaseDC
IntersectRect
InflateRect
CopyRect
EnableWindow
GetSysColor
SendMessageW
InvalidateRect
GetClientRect
DefWindowProcW
SystemParametersInfoW
GetMenuItemInfoW
UnregisterClassW
GetSysColorBrush
SetParent
GetSystemMenu
DeleteMenu
IsRectEmpty
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
UnpackDDElParam
ReuseDDElParam
LoadMenuW
DestroyMenu
ReleaseCapture
LoadAcceleratorsW
InsertMenuItemW
CreatePopupMenu
SetRectEmpty
BringWindowToTop
GetDesktopWindow
TranslateAcceleratorW
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
GetClassNameW
GetClassLongPtrW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
GetWindowLongPtrW
SetWindowLongPtrW
GetMessageTime
GetMessagePos
MapWindowPoints
SetCursor
gdi32
SaveDC
RestoreDC
SetBkMode
SetTextColor
SetMapMode
GetClipBox
ExcludeClipRect
IntersectClipRect
LineTo
MoveToEx
SelectClipRgn
GetObjectW
GetPixel
PtVisible
RectVisible
TextOutW
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
CreateSolidBrush
GetCharWidthW
CreateFontW
StretchDIBits
GetTextExtentPoint32W
GetBkColor
CreatePatternBrush
CreateBitmap
BitBlt
DeleteObject
PatBlt
GetDeviceCaps
CombineRgn
SetRectRgn
CreateRectRgnIndirect
CreateRectRgn
CreateFontIndirectW
SetBkColor
SelectObject
Ellipse
CreateCompatibleDC
CreateCompatibleBitmap
SetPixel
ExtTextOutW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
DragFinish
DragQueryFileW
shlwapi
PathFindFileNameW
PathFindExtensionW
oleaut32
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 252KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ