��Z����Y��`[�cd]p#��K����������#3+�zs��f@�[FR�ۚ�5��h�,��: ��Q�"�'�������1���T�Q�˝�����᷏ 7"�u��k\ޣ����c��=� ���� t�����cS�6����D�d^w�N���?c��]�L���AY�k�Zr��G��Ĩhz��� ��w>������LQ��, E��gd0�aC����� ��c���)ɓ�7R��)0���<,y�O�cS��l �Q�1� ��S�J��#8�T�n@�-������^I�x>[���;��y ��`mO��7"͍���Ɲ �=� ɕL�eT�U��.rܒ��5�{M���������F*L���`Oi�>�efyeT�e!���DŽK���?�-7���ߵ�ǯ�u���������X� 4�O/E��l�"�����W&��&:�b=��9<T%4X=�Q������X�%O����I�\@����W����G�Rx�l�Z_R} �B�G�'��c�j�z�_)�/z�R^��.+��$U���aҟ/A��Ư�*�Ġj$`%�]Sp��Ȟ�����s>^&6�]l�֥��6\t�:���U]H�1��Xr`q�V^B���Ά��;���j��S��d���4^1��Ŷ����^yw�� ����D+s��I�Uy&���'� ���_}E��6~��iKUx���Q�w�3��i0~��n�gM4X��A���B/U��"���͋��P��rwӕ�Ie����AL&�TrM�\~p�w�)!�����"^Kd� �/��������:��>��������J�����c�#eLy�M%�S3B?�����R{��.�|Z��[�n)n��sl�5H���PıԎ��"������Ǚr�^D��f���FGє�7짉�ݥl�����-D�"2�'�;F|>^Hq4�Bc��C���m��|�Kv����}v)f��xSz3�o2E� ��I�HA`b�Z���d?�|�Q7_��衎�^я#�[b��+��ޡ�²qS��8XG���п�H���D����b�&0p�)'�/^���/�6$����ihʼ!�sz�a�*���ųjI�fn��u���(�i��s���9/�׆�}t����ݫ����WN�S�D�Кu�'rF�.R�Ȇ-jdBf��B�N�4W"��Q�q�K�p�;d�4'�W[-��y�����h���[j���|7?�'9V/�R�j���y��)d�r'�`�x�@��,���e���A߉��z�����|��)6�K��J>�i��x�/W�e��gU5t��OY��"SX�2ޝ/u��� zE�g�*�}�a�ڐ����*P���[���������m�4�&I��n=��)t{��5ۼP��$�H%�`4�2������Z86�+�>]8$˚zZϹ;Scfڄ+���SC�>�B7#{�߆��x�c�xv������W�����cX�W�1�\$� X���0Cf��_.���X ;���o�����{C rp ��L�1�<������-R�/O��9�s�,��G��@5)����,���.p3,�a���U��E���'��Y���=�f�I�2ɸ�����5�V�cV��A�V�oT]���,�� [��Vk/��o���ǒG�i;�_S0����d5�؞����� q�2�����}�~��P��r�����=��u�A�[�f����5�����K�݊�D?��z,��l�gG�i���]#���yu� ������G�IS��al�h�7W(����C�^����-ԛ�!!E�t��-����<~��)q]�QMp����g#�0?=7�˟���� �@*v���Bh��� ࣹ�����O�:%���C�xÍ4=�+3�z�d��f�@�̤�Py�<y%�LNZ��x����;����3��J]�];�u1��N��ꗇ ���8aBEIXK���������4=1 ���8� Ȼ�_��������st��<��m��e�r���7"���zG�p�#!�ȅM ���u�����y��Ȧ�B���.��&$�P�D�2����� �ߣ;�8Me��IKѻf˾D���.����݁E.�bx�F!�9^��(H�S[�gcxӔ7�$�����Dq���H��e/��(ua#_��~d�f~����ŵ��� �0*�ڐ�@�wXd\m(T{̎�(X�F��Z|��h����?�T�\�8�w��i k+f9Qg�F�f��� ��0�������Ƽ-�N�^� �e�e�(�L�V371�FDQ�(��]�$��0���Y`"|�Vi��ߓԧ��È�O;J�r�@kb+�qyl1������NPȫ*����v:r���y��1����Q8��y�V��H��ᐇ0~)i�Es�y�_:č���N����DS�.P?b#�f��]����v���BME������B\��.�jR\������Js����(x�~���C4�'$�-)���,�qi�0I/ �>�/��Ӯ�˨li��Gn������Y9SOϼG�DZ�E1 X�O��kB�o((�J����xn�7c�+T�,@�F(Z���p�� ��T�6�e �jIŌ��}r���M�c�|�~@��ES��p�e�9g)q���g<;>�b�6�i�������E��U���4�����k��PI��?4ݻ߀Rczy���`��pfAC�4KLV��h�e�4�9u�h�Es�6E��9#J\�?D�C�����H<"���D�����=�9K2wm��[��Y�����7�ܐ����q.e���ܒCj��{��wI�~t���N�b�����%0eA�4�s�����e����A��=� W3��,6PO�(+��+���q�{�^�C�V�0Ax����$������w���g�>�}/��r�}�v��Qt�8:)ƅDA^��c$Xoo��fS���X;C=�xSb?�\��j�%�p�{wN>��ø2��e�H����-)耖��z|��s *�l������ߐ���\z��_������5B�9�ɡ�[�2�P�&&�x�\+��MQ�����z#�W�X�@3{Q@`8Κ��7|Orz��?u&��|
Static task
static1
Behavioral task
behavioral1
Sample
e1829443b17b0aa32a8b7baab0e132eea43460b0d467dfe14a975d99d45a6dbe.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e1829443b17b0aa32a8b7baab0e132eea43460b0d467dfe14a975d99d45a6dbe.exe
Resource
win10v2004-20230915-en
General
-
Target
e1829443b17b0aa32a8b7baab0e132eea43460b0d467dfe14a975d99d45a6dbe
-
Size
8.5MB
-
MD5
910dbc3f9a2a80c9d04f4b01f7b32f0e
-
SHA1
009dadf3726b1b1e247ab5d3cedb48858688415e
-
SHA256
e1829443b17b0aa32a8b7baab0e132eea43460b0d467dfe14a975d99d45a6dbe
-
SHA512
37d163208f3cad51468734cab7670e801f76776b2c36a02f6d43245362097c4fbf4e653660b9f42f9bbc1deb330aead91f3dba426e0a2c6cfd75da60db16c017
-
SSDEEP
196608:lPbHcgNrewqU1KH1l9FcJyQPq5K0Lt31wqiKjC/2eOTgbIJe8e5:xogNyw3KVfFcJ6K0Ld1wyC/2L8bIJe7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1829443b17b0aa32a8b7baab0e132eea43460b0d467dfe14a975d99d45a6dbe
Files
-
e1829443b17b0aa32a8b7baab0e132eea43460b0d467dfe14a975d99d45a6dbe.exe windows x86
e80ca4d153d55f868f22438b1e3012b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageA
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileTime
GetFileSize
GetFileAttributesA
GetTickCount
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
SetErrorMode
GetOEMCP
GetCPInfo
GetThreadLocale
GetProcessVersion
GetLastError
WritePrivateProfileStringA
GlobalFlags
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
MulDiv
SetLastError
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedIncrement
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GlobalUnlock
InterlockedDecrement
FindResourceA
LoadResource
LockResource
GlobalFree
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
VirtualFree
HeapFree
VirtualAlloc
GetProcessHeap
HeapAlloc
LoadLibraryA
SetHandleCount
GetProcAddress
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
VirtualQuery
GetSystemTimeAsFileTime
GetModuleHandleA
CreateEventA
GetModuleFileNameW
LoadLibraryA
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
FreeLibrary
GetTickCount
GlobalFree
GetProcAddress
LocalAlloc
LocalFree
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
GetLastError
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetSysColorBrush
CharNextA
CopyAcceleratorTableA
SetRect
GetNextDlgGroupItem
MessageBeep
CharUpperA
RegisterClipboardFormatA
LoadCursorA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
DestroyMenu
LoadStringA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
CopyRect
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
RegisterWindowMessageA
OffsetRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
UnhookWindowsHookEx
MapDialogRect
SetWindowPos
GetWindow
SetWindowContextHelpId
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
PtInRect
GetClassNameA
GetDesktopWindow
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
PostThreadMessageA
GetInputState
GetMessageA
RegisterClassA
UnregisterClassA
GetUserObjectInformationW
CharUpperBuffW
MessageBoxW
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
gdi32
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetViewportExtEx
GetMapMode
GetDeviceCaps
DeleteObject
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
comctl32
oledlg
ole32
CoFreeUnusedLibraries
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
OleUninitialize
olepro32
oleaut32
wtsapi32
WTSSendMessageW
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.!rc! Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.77770 Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.V80 Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.77771 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.77772 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1230 Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
1231 Size: 5.0MB - Virtual size: 5.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE