Static task
static1
Behavioral task
behavioral1
Sample
4089bf9c1d73aacb3dbcff778505c1dcce0a9ab418fcef0b70bee535c979bbfc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4089bf9c1d73aacb3dbcff778505c1dcce0a9ab418fcef0b70bee535c979bbfc.exe
Resource
win10v2004-20230915-en
General
-
Target
4089bf9c1d73aacb3dbcff778505c1dcce0a9ab418fcef0b70bee535c979bbfc
-
Size
11.0MB
-
MD5
ce56ede228e51fbf54b1ee96c23e0ad6
-
SHA1
392efa5bf9799f5f0e202be98409c195ab4264e3
-
SHA256
4089bf9c1d73aacb3dbcff778505c1dcce0a9ab418fcef0b70bee535c979bbfc
-
SHA512
9c9f60117f22f528bb3488f2459a0ac1ab3c9efe888267db66504df3bb43a79904a50c98c2735e1931fb0b6bed5104d7b635fe78804eb2342dd740fcbbdb84c4
-
SSDEEP
196608:61YnDJuRw5TNEx162ZcGHvrJLAu93Q1eOL20C7+pdHqsH3Ldgmkg8:wWDJ48TNK1ecvrJsu6Nql7+T9H3ymkR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4089bf9c1d73aacb3dbcff778505c1dcce0a9ab418fcef0b70bee535c979bbfc
Files
-
4089bf9c1d73aacb3dbcff778505c1dcce0a9ab418fcef0b70bee535c979bbfc.exe windows x86
5c2f7b9ccac5b9d6556a6097a3a62843
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
LoadLibraryA
GlobalFindAtomW
SetErrorMode
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
Sleep
ExitProcess
SetStdHandle
GetFileType
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetCurrentDirectoryA
GlobalFlags
GetDriveTypeA
SetEnvironmentVariableA
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetFileTime
GetFileSizeEx
GetThreadLocale
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
CompareStringW
InterlockedIncrement
FindNextFileW
GetCurrentProcessId
GlobalAddAtomW
InterlockedDecrement
FreeResource
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
GetModuleHandleA
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
GetModuleHandleW
LocalAlloc
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
lstrlenW
MulDiv
lstrlenA
GetProcAddress
LoadLibraryW
FindClose
FindFirstFileW
GetTickCount
UnmapViewOfFile
GetFileSize
FileTimeToSystemTime
GetLastError
TerminateProcess
OpenProcess
GetVersionExW
GetModuleFileNameW
SetFileTime
GetFileAttributesW
WideCharToMultiByte
LocalFileTimeToFileTime
GetCurrentDirectoryW
SystemTimeToFileTime
ReadFile
SetFilePointer
WritePrivateProfileStringW
WaitForSingleObject
FindResourceW
LoadResource
LockResource
SizeofResource
CreateDirectoryW
SetUnhandledExceptionFilter
MultiByteToWideChar
CloseHandle
WriteFile
CreateFileW
DeleteFileW
user32
RegisterWindowMessageW
LoadIconW
SendDlgItemMessageA
WinHelpW
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
SetActiveWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
DefWindowProcW
CallWindowProcW
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
UnregisterClassW
PostThreadMessageW
MessageBeep
IsChild
GetTopWindow
GetNextDlgTabItem
GetNextDlgGroupItem
InvalidateRgn
EqualRect
IntersectRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
OffsetRect
CopyRect
CharNextW
ShowWindow
MoveWindow
SetWindowLongW
IsWindow
IsDialogMessageW
SendDlgItemMessageW
GetDlgItem
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
EndPaint
BeginPaint
GetWindowDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ReleaseCapture
GetCapture
SetCapture
ClientToScreen
CharUpperW
GetWindowTextW
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
CreateDialogIndirectParamW
EndDialog
DestroyMenu
InvalidateRect
IsWindowEnabled
GetClientRect
EnableWindow
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
SendMessageW
ModifyMenuW
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
RegisterClipboardFormatW
GetWindow
SetWindowContextHelpId
GetParent
MapDialogRect
SetWindowPos
PostQuitMessage
PostMessageW
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
DispatchMessageW
TranslateMessage
PeekMessageW
GetDesktopWindow
wsprintfW
SetFocus
gdi32
SetViewportOrgEx
GetStockObject
GetBkColor
GetTextColor
ExtSelectClipRgn
GetMapMode
CreateRectRgnIndirect
DeleteDC
SelectObject
Escape
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
GetRgnBox
GetDeviceCaps
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetObjectW
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
OffsetViewportOrgEx
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
shell32
ShellExecuteW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteExW
shlwapi
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathIsUNCW
UrlUnescapeW
oledlg
OleUIBusyW
ole32
CoRegisterMessageFilter
OleFlushClipboard
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRevokeClassObject
OleIsCurrentClipboard
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
VariantChangeType
VariantClear
VariantInit
SysFreeString
SysAllocStringLen
SysStringLen
psapi
EnumProcesses
GetModuleBaseNameW
GetModuleFileNameExW
EnumProcessModules
iphlpapi
GetAdaptersInfo
GetAdaptersAddresses
netapi32
Netbios
snmpapi
SnmpUtilOidNCmp
SnmpUtilVarBindFree
SnmpUtilOidCpy
ws2_32
WSAStartup
wininet
HttpOpenRequestW
InternetOpenUrlW
InternetConnectW
HttpSendRequestW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
HttpAddRequestHeadersW
InternetQueryDataAvailable
InternetQueryOptionW
InternetCanonicalizeUrlW
GetUrlCacheEntryInfoW
InternetCrackUrlW
DeleteUrlCacheEntryW
Sections
.text Size: 281KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58.2MB - Virtual size: 58.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ