Static task
static1
Behavioral task
behavioral1
Sample
0f1e280fdc3385c02b5a2b4bf436cbb119a17cf33dba6201666c1e177f243aed.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0f1e280fdc3385c02b5a2b4bf436cbb119a17cf33dba6201666c1e177f243aed.exe
Resource
win10v2004-20230915-en
General
-
Target
0f1e280fdc3385c02b5a2b4bf436cbb119a17cf33dba6201666c1e177f243aed
-
Size
11.0MB
-
MD5
93b86eef2982404b77e8d55afc51309d
-
SHA1
efe7aa51fea5dc7b9b743dc80f059501c40816bd
-
SHA256
0f1e280fdc3385c02b5a2b4bf436cbb119a17cf33dba6201666c1e177f243aed
-
SHA512
88d7bb55acc8d9d5fdf9b82f768acf31f187bf554487d27a7e8f5492b3f29b39aac8cc0f42fc89fea75e13d0a93f9b6ee3cce1826a8fb44fe99e5cf565943981
-
SSDEEP
196608:cL/3SnvP3Zafu72sHPjPJsv6tWKFdu9CGFd:crSnz2svjPJsv6tWKFdu9C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f1e280fdc3385c02b5a2b4bf436cbb119a17cf33dba6201666c1e177f243aed
Files
-
0f1e280fdc3385c02b5a2b4bf436cbb119a17cf33dba6201666c1e177f243aed.exe windows x86
a2874ea3e0c04d8f15f1a4de8c2ac8f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExW
GetCurrentDirectoryW
CreateDirectoryW
DeleteFileW
FindClose
FindFirstFileW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
GetLongPathNameW
RemoveDirectoryW
GetTempPathW
DeviceIoControl
CopyFileW
MoveFileW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
VirtualQuery
OpenFileMappingW
MultiByteToWideChar
WideCharToMultiByte
FindFirstFileExW
FindNextFileW
ReleaseSemaphore
CreateSemaphoreW
FreeLibrary
GetModuleHandleExW
GetTimeZoneInformation
GetGeoInfoW
GetUserGeoID
ExitProcess
SetHandleInformation
lstrcmpW
GetVolumeInformationW
GetDriveTypeW
EncodePointer
DecodePointer
RaiseException
RtlUnwind
UnmapViewOfFile
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
AreFileApisANSI
ExitThread
LoadLibraryExW
EnterCriticalSection
LeaveCriticalSection
SetStdHandle
SetFileAttributesW
GetConsoleMode
ReadConsoleW
GetConsoleCP
HeapSize
SetLastError
GetProcessHeap
GetStdHandle
DeleteCriticalSection
GetModuleFileNameA
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetEnvironmentVariableA
WriteConsoleW
LCMapStringW
EnumSystemLocalesW
GetStringTypeW
VirtualFree
VirtualAlloc
CreateMutexW
ReleaseMutex
InitializeCriticalSection
MapViewOfFile
CreateFileMappingW
WriteFile
SetErrorMode
SetFilePointerEx
SetEndOfFile
ReadFile
GetLogicalDrives
GetFileType
FlushFileBuffers
CreateFileW
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
GetModuleFileNameW
GetStartupInfoW
GetUserDefaultUILanguage
GetCurrencyFormatW
GetTimeFormatW
GetDateFormatW
ResetEvent
LoadLibraryW
GetSystemDirectoryW
WaitForSingleObjectEx
GetConsoleWindow
OutputDebugStringW
GetLocalTime
GetSystemTime
WaitForMultipleObjects
GetSystemInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
ResumeThread
TerminateThread
GetThreadPriority
SetThreadPriority
GetCurrentThread
CreateThread
Sleep
CreateEventW
WaitForSingleObject
SetEvent
DuplicateHandle
GetCommandLineW
GetUserDefaultLCID
CompareStringW
GetCurrentProcessId
FindNextChangeNotification
GlobalSize
LoadLibraryA
GetLocaleInfoW
GlobalUnlock
GlobalLock
GlobalAlloc
OpenProcess
CheckRemoteDebuggerPresent
ExpandEnvironmentStringsW
GetUserDefaultLangID
IsValidLocale
IsValidLanguageGroup
FormatMessageW
LocalFree
GetProcAddress
GetModuleHandleW
GetCurrentThreadId
GetLastError
FindCloseChangeNotification
FindFirstChangeNotificationW
GetVolumeInformationA
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
TerminateProcess
GetCommandLineA
GetCurrentProcess
netapi32
Netbios
user32
CharNextExA
MessageBoxW
DrawIconEx
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
KillTimer
SetTimer
MsgWaitForMultipleObjectsEx
GetQueueStatus
DispatchMessageW
TranslateMessage
RealGetWindowClassW
EnumWindows
GetDoubleClickTime
MessageBeep
GetCaretBlinkTime
GetWindowTextW
SystemParametersInfoW
SendMessageW
PostMessageW
AttachThreadInput
DefWindowProcW
CreateWindowExW
IsChild
DestroyWindow
ShowWindow
FlashWindowEx
MoveWindow
SetWindowPos
GetWindowPlacement
SetWindowPlacement
NotifyWinEvent
SetMenuItemInfoW
TrackPopupMenuEx
GetMenu
MapVirtualKeyW
ToUnicode
ToAscii
GetKeyboardState
GetKeyState
IsZoomed
PeekMessageW
SetCaretPos
HideCaret
DestroyCaret
CreateCaret
RegisterWindowMessageW
GetKeyboardLayout
GetAsyncKeyState
IsWindowVisible
GetMessageExtraInfo
TrackMouseEvent
GetClipboardFormatNameW
RegisterClassW
GetCursorInfo
GetIconInfo
CreateIconIndirect
CreateCursor
LoadCursorW
GetCursor
GetDesktopWindow
SetCursorPos
IsIconic
SetFocus
GetCapture
SetCapture
ReleaseCapture
GetSystemMetrics
GetCursorPos
GetSystemMenu
EnableMenuItem
GetForegroundWindow
SetForegroundWindow
GetDC
ReleaseDC
BeginPaint
EndPaint
GetUpdateRect
SetWindowRgn
InvalidateRect
SetWindowTextW
RegisterClipboardFormatW
ChangeClipboardChain
SetClipboardViewer
LoadIconW
GetSysColor
EnumDisplayMonitors
GetMonitorInfoW
LoadImageW
GetSysColorBrush
ChildWindowFromPointEx
GetClientRect
GetFocus
RegisterClassExW
GetClassInfoW
UnregisterClassW
GetKeyboardLayoutList
GetAncestor
DestroyIcon
DestroyCursor
GetWindowThreadProcessId
SetParent
GetParent
SetWindowLongW
GetWindowLongW
ScreenToClient
ClientToScreen
SetCursor
AdjustWindowRectEx
GetWindowRect
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
SHGetFileInfoW
Shell_NotifyIconW
ole32
CoTaskMemAlloc
CoGetMalloc
ReleaseStgMedium
CoTaskMemFree
DoDragDrop
CoCreateInstance
StringFromGUID2
OleIsCurrentClipboard
OleFlushClipboard
OleGetClipboard
OleSetClipboard
CoCreateGuid
CoInitialize
OleUninitialize
OleInitialize
RevokeDragDrop
RegisterDragDrop
CoLockObjectExternal
CoUninitialize
advapi32
RegCloseKey
RegQueryValueExW
OpenProcessToken
CopySid
FreeSid
GetLengthSid
GetTokenInformation
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegFlushKey
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
ws2_32
WSASendTo
WSASend
WSARecvFrom
WSARecv
WSANtohs
WSANtohl
WSAIoctl
WSAHtonl
WSAConnect
WSAAccept
select
listen
htons
getsockname
WSASocketW
closesocket
bind
__WSAFDIsSet
getsockopt
WSAGetLastError
gethostbyname
gethostbyaddr
ntohl
inet_addr
htonl
WSAAsyncSelect
WSACleanup
WSAStartup
gethostname
getpeername
setsockopt
gdi32
BitBlt
CreateRectRgn
DeleteObject
OffsetRgn
GetDeviceCaps
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
DeleteDC
SelectObject
EnumFontFamiliesExW
CreateFontIndirectW
GetFontData
GetStockObject
AddFontResourceExW
RemoveFontResourceExW
AddFontMemResourceEx
RemoveFontMemResourceEx
GetTextMetricsW
GetObjectW
GetTextFaceW
ChoosePixelFormat
DescribePixelFormat
GetPixelFormat
SetPixelFormat
SwapBuffers
CreateDIBSection
GdiFlush
GetBitmapBits
GetCharABCWidthsW
GetCharABCWidthsFloatW
GetGlyphOutlineW
GetOutlineTextMetricsW
GetTextExtentPoint32W
GetCharABCWidthsI
SetBkMode
SetGraphicsMode
SetTextColor
SetTextAlign
SetWorldTransform
ExtTextOutW
CreateBitmap
GetDIBits
GetRegionData
SelectClipRgn
CombineRgn
oleaut32
SysStringLen
VariantInit
VariantChangeType
SystemTimeToVariantTime
SysFreeString
SysAllocStringLen
SysAllocString
imm32
ImmGetDefaultIMEWnd
ImmReleaseContext
ImmAssociateContext
ImmGetCompositionStringW
ImmNotifyIME
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmGetVirtualKey
ImmGetContext
winmm
PlaySoundW
iphlpapi
GetAdaptersAddresses
GetAdaptersInfo
Sections
.text Size: 6.7MB - Virtual size: 6.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qtmetad Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 222KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ