Static task
static1
Behavioral task
behavioral1
Sample
4660cd6d2f05d07aac9881cbd3280043d92e635409eafc7f4d62e581c6675e6d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4660cd6d2f05d07aac9881cbd3280043d92e635409eafc7f4d62e581c6675e6d.exe
Resource
win10v2004-20230915-en
General
-
Target
4660cd6d2f05d07aac9881cbd3280043d92e635409eafc7f4d62e581c6675e6d
-
Size
7.4MB
-
MD5
edac04e8ed094ef935a5700733b6d09d
-
SHA1
7cd7d2f6b4a96b4a262b21f4aeb184f5e9f8070f
-
SHA256
4660cd6d2f05d07aac9881cbd3280043d92e635409eafc7f4d62e581c6675e6d
-
SHA512
618ee2affc215bd9c1c8d4656cbff5915b7d8016f6305eba8ec04bbf7597e5f6d0da1317e8c29577d1b9682c34051326744ebc7fef2acf5d734b0b459f04f0bc
-
SSDEEP
196608:x375Mx2oWqrJ6u4Oug0P7AKX2PeVJTB0Gf0MAPdeDPWMcnQflU/T7:nMwBsJUX2yJX6wWDQ6r7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4660cd6d2f05d07aac9881cbd3280043d92e635409eafc7f4d62e581c6675e6d
Files
-
4660cd6d2f05d07aac9881cbd3280043d92e635409eafc7f4d62e581c6675e6d.exe windows x86
12752283b37d672633b576ce66571e74
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
GetTempPathW
FindResourceW
WriteFile
SizeofResource
LoadResource
LockResource
SetCurrentDirectoryW
Process32NextW
Process32FirstW
GetCurrentDirectoryW
FreeLibraryAndExitThread
ExitThread
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
ExpandEnvironmentStringsW
PeekNamedPipe
WaitForMultipleObjects
GlobalAlloc
SleepEx
ResetEvent
SetEvent
lstrlenA
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
GetFileSizeEx
GetFileInformationByHandle
InterlockedCompareExchange
CreateEventW
CreateToolhelp32Snapshot
GetModuleHandleW
GetLastError
GetCurrentProcessId
LocalFree
LocalAlloc
WideCharToMultiByte
OutputDebugStringA
Sleep
InterlockedDecrement
GlobalLock
GlobalUnlock
GetSystemDirectoryA
MulDiv
MultiByteToWideChar
IsProcessorFeaturePresent
IsDebuggerPresent
InterlockedIncrement
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GlobalFree
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
DecodePointer
HeapDestroy
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetSystemInfo
FormatMessageW
GetVersionExW
GetPrivateProfileStringW
FindClose
CreateDirectoryW
FindFirstFileW
FindNextFileW
MoveFileExW
FileTimeToSystemTime
ReleaseMutex
CreateMutexW
GetTickCount
AreFileApisANSI
HeapCreate
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetFullPathNameW
FreeResource
GetLocalTime
GetVersionExA
GetModuleHandleA
EncodePointer
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetStringTypeW
CompareStringW
LCMapStringW
GetFileType
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
OutputDebugStringW
WaitForSingleObjectEx
SetStdHandle
GetConsoleCP
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetEndOfFile
CreateFileW
WritePrivateProfileStringW
GetModuleFileNameW
ReadFile
GetFileSize
CreateThread
QueryDosDeviceW
GetWindowsDirectoryW
LoadLibraryW
GetLogicalDriveStringsW
lstrcmpiW
CloseHandle
OpenProcess
LoadLibraryA
lstrlenW
SetLastError
GetProcessHeap
HeapFree
HeapAlloc
VirtualFree
VirtualAlloc
GetProcAddress
UnhandledExceptionFilter
FreeLibrary
user32
GetCaretBlinkTime
HideCaret
SetCaretPos
ScreenToClient
GetClassNameW
DestroyIcon
LoadBitmapW
CreateIconFromResource
LoadImageW
CharNextW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
ClientToScreen
EnableMenuItem
GetSysColor
GetSystemMetrics
IsWindowVisible
DrawTextW
SystemParametersInfoA
CharLowerBuffW
MapVirtualKeyA
UpdateLayeredWindow
IsMenu
IsWindowEnabled
CreatePopupMenu
DestroyMenu
GetMenuItemCount
AppendMenuW
TrackPopupMenu
GetMenuInfo
SetMenuInfo
GetMenuItemInfoW
SetMenuContextHelpId
MsgWaitForMultipleObjects
SetWindowLongW
CreateCaret
GetWindowRect
GetClientRect
GetActiveWindow
GetDlgItem
CreateWindowExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
GetWindowLongW
GetFocus
SetFocus
PtInRect
EqualRect
IsRectEmpty
UnionRect
CopyRect
SetRect
SetCursor
KillTimer
SetTimer
DestroyWindow
DestroyCursor
LoadCursorW
IntersectRect
LoadStringW
GetForegroundWindow
UnregisterClassW
GetIconInfo
DrawIconEx
OffsetRect
InflateRect
ReleaseDC
GetDC
SendMessageW
ShowWindow
SetWindowPos
SetWindowTextW
IsWindow
GetKeyState
SetForegroundWindow
GetCursorPos
InvalidateRect
EndPaint
BeginPaint
FindWindowW
UpdateWindow
ReleaseCapture
SetCapture
GetCapture
IsZoomed
IsIconic
SetLayeredWindowAttributes
AnimateWindow
PostQuitMessage
TrackMouseEvent
PostMessageW
GetMonitorInfoW
MonitorFromWindow
GetWindow
MapWindowPoints
GetParent
SystemParametersInfoW
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
ImpersonateLoggedOnUser
RevertToSelf
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountSidW
SetSecurityDescriptorDacl
OpenProcessToken
GetTokenInformation
SetTokenInformation
InitializeSecurityDescriptor
shell32
SHGetPathFromIDListW
SHGetFolderPathW
SHGetSpecialFolderPathW
SHBrowseForFolderW
ShellExecuteW
ole32
OleLockRunning
CoCreateGuid
CLSIDFromString
CLSIDFromProgID
CreateBindCtx
OleInitialize
OleUninitialize
CreateStreamOnHGlobal
CoCreateInstance
shlwapi
PathFileExistsW
StrToIntExW
psapi
EnumProcessModules
GetModuleFileNameExW
EnumProcesses
GetProcessImageFileNameW
crypt32
CryptMsgGetParam
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
CryptMsgClose
gdiplus
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
GdipGetImageHeight
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipDeleteGraphics
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipDrawImageI
GdipSaveImageToFile
GdipBitmapUnlockBits
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipGraphicsClear
GdipDrawImageRectI
imm32
ImmReleaseContext
ImmGetContext
ImmAssociateContext
gdi32
GetStockObject
CreateSolidBrush
Rectangle
GetCurrentObject
SetViewportOrgEx
GetObjectW
SetBkMode
BitBlt
StretchBlt
GetViewportOrgEx
CreateFontIndirectW
EnumFontFamiliesExW
GetCharABCWidthsW
GetFontData
GetGlyphOutlineW
GetOutlineTextMetricsW
GetFontUnicodeRanges
DeleteDC
DeleteObject
ExtCreateRegion
GetRegionData
IntersectClipRect
SelectClipRgn
SelectObject
CreateDIBSection
SetGraphicsMode
GetDeviceCaps
CreateBitmap
CreateRoundRectRgn
EnumFontsW
CreateCompatibleDC
GdiFlush
GetTextFaceW
ExtTextOutW
SetWorldTransform
GetTextMetricsW
SetTextAlign
SetTextColor
RemoveFontMemResourceEx
AddFontMemResourceEx
GetTextExtentPointI
GetGlyphIndicesW
oleaut32
SysAllocString
SysFreeString
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
ws2_32
htons
ntohs
setsockopt
WSASetLastError
htonl
inet_addr
inet_ntoa
gethostbyaddr
gethostbyname
getservbyport
getsockopt
__WSAFDIsSet
select
recvfrom
sendto
accept
listen
ioctlsocket
gethostname
getsockname
getpeername
connect
bind
WSACleanup
socket
closesocket
WSAGetLastError
send
recv
getservbyname
WSAStartup
usp10
ScriptShape
ScriptFreeCache
ScriptItemize
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 451KB - Virtual size: 451KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 57KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 376B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76.5MB - Virtual size: 76.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ