Static task
static1
Behavioral task
behavioral1
Sample
740a28ebce3b8854d47e77796297b276.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
740a28ebce3b8854d47e77796297b276.exe
Resource
win10v2004-20230915-en
General
-
Target
740a28ebce3b8854d47e77796297b276.exe
-
Size
1.2MB
-
MD5
740a28ebce3b8854d47e77796297b276
-
SHA1
b998420250acad74e6660692ad81aaf0cdb197aa
-
SHA256
92e2b4bf55a969724a593607470296b7e689aa05b501eba0f1d6036cb10239bb
-
SHA512
398fe7fee40a423db23c69af1f7ccdd955bb6419cd359925b5a4b077cd3069233d9e79a164b65c7c728a495e8e0495f52924bb13bc5aebec2ea650c37be778f7
-
SSDEEP
24576:b9qsfvwdj1ZITsA3U99HkKxoUJP8sqM5TLhN9QoZUFKDl:b9qs3mZHoOHkKxoU5qcXxQwgy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 740a28ebce3b8854d47e77796297b276.exe
Files
-
740a28ebce3b8854d47e77796297b276.exe.exe windows x86
ad1c0e2c3adb8cd08dabab022fdba889
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
DeleteTimerQueueTimer
GetDiskFreeSpaceExW
lstrcmpW
OutputDebugStringW
lstrcmpA
CreateToolhelp32Snapshot
GetCurrentProcess
Process32FirstW
Process32NextW
GetLogicalDriveStringsW
QueryDosDeviceW
WaitForSingleObject
TerminateProcess
GetCurrentProcessId
FindClose
GetFullPathNameW
FindFirstFileW
lstrlenW
SetFileAttributesW
DeleteFileW
FindNextFileW
RemoveDirectoryW
ExitProcess
VirtualProtect
MoveFileExW
Sleep
SetEnvironmentVariableW
LocalFree
GetCommandLineW
GetTempFileNameW
GetLogicalDrives
GetDriveTypeW
LocalAlloc
OutputDebugStringA
GetVersion
lstrcpyA
lstrcpyW
lstrlenA
MulDiv
GetProfileIntA
GlobalAlloc
GlobalLock
SetEndOfFile
WriteConsoleW
CreatePipe
GetFileAttributesExW
GetExitCodeProcess
FlushFileBuffers
ReadConsoleW
GetConsoleMode
GetConsoleCP
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
FreeResource
HeapDestroy
FindFirstFileExW
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
CreateProcessA
DuplicateHandle
GetTempPathW
QueryPerformanceFrequency
GetACP
GetStdHandle
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
SetFileTime
CreateDirectoryW
FormatMessageA
GetModuleFileNameA
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
WaitForSingleObjectEx
ResetEvent
SetEvent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
GetCPInfo
GetVersionExW
InterlockedIncrement
DeleteCriticalSection
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
lstrcmpiW
GetCurrentThreadId
EnterCriticalSection
RaiseException
LeaveCriticalSection
ExpandEnvironmentStringsW
FreeLibrary
OpenProcess
MultiByteToWideChar
WideCharToMultiByte
GetLastError
CreateMutexW
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
IsValidCodePage
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
SetFilePointerEx
SetFilePointer
CloseHandle
GetFileAttributesW
WriteFile
ReadFile
CreateFileW
GetModuleFileNameW
GetModuleHandleExW
GetSystemDirectoryW
LoadLibraryW
SetCurrentDirectoryW
GetCurrentDirectoryW
LoadLibraryExW
GetModuleHandleW
HeapSize
GetProcAddress
user32
FindWindowW
SwitchToThisWindow
GetShellWindow
GetWindowThreadProcessId
LoadImageW
GetSystemMetrics
SendMessageW
SetWindowPos
SetWindowLongW
GetWindowLongW
SetWindowTextW
MapWindowPoints
GetClientRect
GetParent
GetWindowRect
GetMonitorInfoW
MonitorFromWindow
GetWindow
SetTimer
PostMessageW
IsIconic
PtInRect
GetDC
ReleaseDC
UpdateLayeredWindow
IsDialogMessageW
PostQuitMessage
GetCursorPos
ScreenToClient
SetCursor
LoadCursorW
DestroyWindow
KillTimer
EndDialog
CharNextW
DefWindowProcW
GetClassInfoW
RegisterClassW
ShowWindow
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
UnregisterClassW
CreateDialogParamW
MessageBoxW
EnableWindow
BringWindowToTop
LoadStringW
GetCaretPos
ExitWindowsEx
IsRectEmpty
GetSysColor
GetDoubleClickTime
GetDesktopWindow
GetKeyState
GetDlgItem
GetFocus
IntersectRect
GetActiveWindow
InflateRect
InvalidateRect
ReleaseCapture
ShowScrollBar
EnableScrollBar
SetScrollRange
SetScrollPos
SetCapture
UpdateWindow
OffsetRect
DestroyCursor
ClientToScreen
ScrollWindowEx
SetCaretPos
HideCaret
ShowCaret
CreateCaret
EnumWindows
gdi32
CreateRectRgn
ExtSelectClipRgn
BitBlt
GetTextMetricsW
GdiSetBatchLimit
GetDeviceCaps
DPtoLP
GetStockObject
CreateDIBSection
DeleteObject
SelectObject
CreateCompatibleDC
DeleteDC
CreateFontIndirectW
GetObjectW
advapi32
RegCloseKey
SetSecurityDescriptorDacl
OpenProcessToken
ControlService
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegQueryValueExW
RegEnumValueW
RegQueryInfoKeyW
DuplicateTokenEx
InitializeSecurityDescriptor
shell32
ShellExecuteExW
SHFileOperationW
SHGetFolderPathW
ord165
ShellExecuteW
SHGetSpecialFolderPathW
CommandLineToArgvW
SHGetPathFromIDListW
SHBrowseForFolderW
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
CoInitialize
OleInitialize
OleUninitialize
RevokeDragDrop
RegisterDragDrop
CreateStreamOnHGlobal
CoTaskMemFree
oleaut32
VarUI4FromStr
SysFreeString
shlwapi
PathCombineW
PathIsURLW
PathIsDirectoryW
PathRemoveFileSpecW
SHDeleteValueW
SHSetValueW
PathGetDriveNumberW
PathRemoveBackslashW
PathFileExistsW
comctl32
InitCommonControlsEx
_TrackMouseEvent
msimg32
AlphaBlend
gdiplus
GdipDeleteGraphics
GdipCloneBrush
GdiplusStartup
GdipFillRectangleI
GdipReleaseDC
GdipGetDC
GdipGetClipBoundsI
GdipGetImageHeight
GdipSetInterpolationMode
GdipGetInterpolationMode
GdipLoadImageFromStream
GdipDisposeImage
GdipCloneImage
GdipResetClip
GdipSetClipRect
GdipDeleteFont
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipGetGenericFontFamilySansSerif
GdipCreateFont
GdiplusShutdown
GdipDeleteBrush
GdipCreateSolidFill
GdipDrawImagePointRectI
GdipDrawString
GdipSetTextRenderingHint
GdipGetTextRenderingHint
GdipGetImageWidth
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipDrawImageRectRect
GdipFree
GdipAlloc
GdipCreateFromHDC
wintrust
WinVerifyTrust
wininet
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
InternetSetOptionW
HttpOpenRequestA
InternetConnectA
InternetSetOptionA
InternetCrackUrlA
InternetOpenA
InternetCloseHandle
HttpAddRequestHeadersA
InternetQueryDataAvailable
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
psapi
GetProcessImageFileNameW
imm32
ImmGetContext
ImmSetCompositionWindow
ImmReleaseContext
Sections
.text Size: 562KB - Virtual size: 561KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66.0MB - Virtual size: 66.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ