"��ƻg%8�����V���_1l,��s5���K7���Y�Dv V����h�^l//��c�_�h�Fn[6�?>e���8ay>����k���g(��1��]z=ӫr�����ou�����5wA��P2�_��>hd=[�z~IdfIV<��� ��h�B.2�a��^1�,�O��mf���9S����Rn:��51Q�k��A�^����m�eL�i�-���_BA������M��c�`o�͖����Q���v�����7� �J�_RWO(�F@���c�A�*b(��Pӫ7d�K�ƙ���j���3�35�G���8��[U���E��{�^�4(�~4�\�����2g9�|h�l���� ָ�+p��S�Įӭ�;��y�E(wI⹐l����_���o���^�>[�9mavʜd��o� ) k��5S�����z���A�^�@���s�^�6��ap Jg+��1��I���P��fC�%h��[vE��� ��V��qPz�,�&���~�r�챕���pS�i�g���UԎ�Z�5�`����If9=h\��>M�7�t�ڶxr�Yl*a#�㋛��n]߫�PN?��K���w���U[�厺����Ν�W�{&�N��%:T�.�:4�>]���J �e�y�U��:9���y�Fm��<���>�HLЄ��Lhl�,�C�Z�8���K�����B ����A�kX� �^`��sn�f�L5�;+c/��ؔ"N�Xj�8-�{��c����%���'(���ʼnX���RXrO���4)U�"�Z��HƀaRF�k��1�E�@\��×���Q�X4,$�PDAz� �6�9g���W�m�f��.�i�i84�%+Kƭn �� ���F�ֶ`#�A=t��@�)h�܉�/#%i;�?�][ ,��r9��r�n�t<ò�M�$ua2 �����T��s������uT�au�l7T L���+��ʤR��L��ٔ�*��43��L��+�6��⺡I���@7���W�ؑ3N�� I�P:��v�x�WZՅ����X�Gma��P/ݼEK?������1.ɭCúzc����Bua�p2�{���(�_�����ĄyKql\��� [W�`��b?t�X������� r��?.eV��X. :���!d�L�B`!��p��J76>B��ӝ�ͺg�M�o��Pܜ��5_�p���le\\I�u?Cʐ-G-���՜��71K��/,V�C��F�5���9ewS����+TS�J��KڡQ�Ie��z��������x����.������}���]���]���p�Xbw�'�� d4;���Y/ʺ�U��}NtJl��:�KG{�����^0V��&7 Rr�q2F��'�:�\��w�65�|�F<��E�3�c�òi]d$yE7�z�?�zû_��#R�!���,iV:�ȓ!?8�txp�r�ʴMb{Ypf�唥�������Ff�>�$�<:�_�ը˱o#]`B�yY���?������;�OB��qS�����?�Uo�� ���8F�h�"��h��;�F/ G7r����<Ie��IκhQ���R3�ԕ=��Ĥ`��g[�۟�d�:3�T�H~������iȄV��Zш�˥>��6$� R��mJ���՜�k�Q�cOWN" /�o�X�)W�<e���o9��I_�G8{p#�ɜ�G�$�$���_ߘC�z��C�Ӫ���� �r�'<�Ӳ�Y�ȥ����\�|гF0�~S�0�"[E|�X!?ߓ�;�����*"�"9\,�}���F�ϟ��sj��ɴ^�q�hݢ�� r�n�H�`M<�l*�� ЈM'!Y�����%��̆�F�Ǖ�4b��#>c�}_��J�� ��Nל,6�9�������#���l���8�4���� �g|�vy=���#�Ό��0}��5��� +x��8Jġ2.�E�q�o��f�%�����ൽ��}.T�881B]ĤK XW����(]�6i����92X���#o���n����4�AZ�jF��aYp_ +����u�nI����K��@��E�����qn���E�;~p�'`-�{��_V��Жp��K���}�rs\��ɽ��"ҞЬ�V��Vu��t�"�������-E����q� �S*4n��Ȥ�_EQVY)��ׯ"�͌L}�з��̵���=�����f]o2�z���1���0a�d9�X�}������$���G�x�!��̵�"����xX7��F���BfΗF/���Y_��A⌇p���:�d����N��0+I���`b��k+��l��i����d8u!��)�)��A��5�-<56'��a��K�������ʱrɛ� �P�-�qP��{�p��ә퓷\��|�@� Z��Wn���_(�& ��kl0�7�� č&�����O*����b���G IВ������G��/�қ{F��[= �)��_����{�ڷ�A �<�M&%�ه�f��1��c��̖QJ����������Z����h�r(�^�)��kD����k<;�EYj���^���~�K�_�� <�CaZ�f�~̎LA���j�J�f��H�����E��;��*]ݼWID5�yov1��0���nߑᝓ�x���P���?<O��]/gt�麼1���I��2�{���b��h��[0 �D0�, ¤ %2��8�^�꾷�7"1�73s��Y�.��z�]�fZβ���#~���*բ]Q�P�q� :D�Wj���F�8��y���w���[eU2OlH��&D���WQ�r�O�-L�TN�W����'Ukk��p��EͿ��4��������:�{�2����� �A-�!R!n����U��ߏ���Ǚ����؍b��N�i�|c��{��I ���S�a��~±�#bݰ� Vz[R�?���&����(*�̘`�M�\{���)+'�N��t�c��B7�� A@%��*`�,�oV,�}��le�Z_��<T5h�9B-�QZ��\���M��ѓ������٣_ڰ `� ��KK.@��Xv�h�UP��0�M-j�{����O��Y��-�h g
Static task
static1
Behavioral task
behavioral1
Sample
c62ef7bee970b93b2711db06a1f87d91a39de8ffced327271742578e7c919b8f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c62ef7bee970b93b2711db06a1f87d91a39de8ffced327271742578e7c919b8f.exe
Resource
win10v2004-20230915-en
General
-
Target
c62ef7bee970b93b2711db06a1f87d91a39de8ffced327271742578e7c919b8f
-
Size
7.0MB
-
MD5
9b1c124a1b76f46662992f9d1228cb1d
-
SHA1
e05c936c487d687fad93d26401b4e6db3576dd96
-
SHA256
c62ef7bee970b93b2711db06a1f87d91a39de8ffced327271742578e7c919b8f
-
SHA512
17c58930532e9b9dbf031d0ef9dc7e7a57c067406e806e6661e1d6cae39ef57cd6525bb7a007272c285f2d9754d7e0f46963fdc685a7982277e781cd64c1cda6
-
SSDEEP
98304:vq1wJXTzFeUG8Zl3B+4SxxJhH5cnzL1yBy5USf/Oaf2c1QUPBGN7l+SUyhlbiW:VxIUGUkXJR5PI5USOafaUpGN7l+SR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c62ef7bee970b93b2711db06a1f87d91a39de8ffced327271742578e7c919b8f
Files
-
c62ef7bee970b93b2711db06a1f87d91a39de8ffced327271742578e7c919b8f.exe windows x86
5214675ffd75290d6cce3a9e821349db
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
kernel32
LockResource
LoadResource
FindResourceW
FindResourceExW
WideCharToMultiByte
OpenProcess
SizeofResource
WTSGetActiveConsoleSessionId
GetModuleFileNameA
Sleep
LocalAlloc
CreateEventA
CreateThread
WaitForSingleObject
ExpandEnvironmentStringsA
WriteFile
ReadFile
GetFileSize
CreateFileA
GetLastError
CloseHandle
SetFileAttributesA
GetFileAttributesExA
GetCurrentProcess
GetModuleHandleA
GetProcAddress
SetFilePointer
SetStdHandle
CreateFileW
WriteConsoleW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LoadLibraryW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoW
GetUserDefaultLCID
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
InitializeCriticalSectionAndSpinCount
GetCommandLineA
HeapSetInformation
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetCPInfo
CompareStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetSystemTimeAsFileTime
GetSystemTimeAsFileTime
GetModuleHandleA
CreateEventA
GetModuleFileNameW
LoadLibraryA
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
FreeLibrary
GetTickCount
SystemTimeToFileTime
FileTimeToSystemTime
GlobalFree
LocalAlloc
LocalFree
GetProcAddress
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
GetLastError
FlushFileBuffers
VirtualQuery
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
QueryServiceConfigA
EnumServicesStatusA
DeleteService
QueryServiceStatus
ControlService
OpenServiceA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
SetTokenInformation
DuplicateTokenEx
CreateProcessAsUserA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
StartServiceCtrlDispatcherA
shlwapi
PathFileExistsA
ws2_32
inet_ntoa
WSACleanup
gethostbyname
gethostname
WSAStartup
psapi
EnumProcessModules
EnumProcesses
GetModuleFileNameExA
user32
CharUpperBuffW
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx0 Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.upx1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx2 Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE