Static task
static1
Behavioral task
behavioral1
Sample
c2661d55054bbe53e48a80acea7618d8e28aaa2f903d9487ab0caa2f43491c64.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c2661d55054bbe53e48a80acea7618d8e28aaa2f903d9487ab0caa2f43491c64.exe
Resource
win10v2004-20230915-en
General
-
Target
c2661d55054bbe53e48a80acea7618d8e28aaa2f903d9487ab0caa2f43491c64
-
Size
4.8MB
-
MD5
05fa73ef043cddb6a6a28b1e030a41f9
-
SHA1
5078c13856b22895032de66b7c9ef8b19233d461
-
SHA256
c2661d55054bbe53e48a80acea7618d8e28aaa2f903d9487ab0caa2f43491c64
-
SHA512
fd4cfc3c9a0029f06fe05e785b3f8a84e0fb5687fe374d12173ee3bd98221f406c9b03fbc41755a0e2318c3f63abde1487497f2fca3f09bec0148ed5b72f0766
-
SSDEEP
98304:DtWHJOc0fbD5nSSyqIW++Cbc0vpcyBd6Mb6w/5b5l4bXJFb0:DS6X4SyqIz+CEyBd6Mbf/5mXJR0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2661d55054bbe53e48a80acea7618d8e28aaa2f903d9487ab0caa2f43491c64
Files
-
c2661d55054bbe53e48a80acea7618d8e28aaa2f903d9487ab0caa2f43491c64.exe windows x86
22f495ab51779e8e85af09ed29131bcd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
SetErrorMode
WritePrivateProfileStringW
GlobalFlags
GetStartupInfoW
HeapAlloc
HeapFree
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
TlsFree
GetTickCount
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LCMapStringW
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CreateFileA
SetEnvironmentVariableA
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
InterlockedDecrement
GetModuleHandleA
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GlobalAddAtomW
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
lstrcmpW
GetFileTime
GetFileSizeEx
GetFileAttributesExW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
MoveFileW
FormatMessageW
FreeResource
GlobalUnlock
GlobalLock
DeleteFileW
DeviceIoControl
FindClose
QueryPerformanceCounter
LocalFree
GlobalFree
GlobalAlloc
FindNextFileW
GetFileAttributesW
FindFirstFileW
CreateDirectoryW
GetWindowsDirectoryW
GetSystemTimeAsFileTime
GetVersionExW
GetModuleHandleW
GetModuleFileNameW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
SetLastError
ReadFile
WriteFile
CreateFileW
GetCurrentProcess
CreateProcessW
GetExitCodeProcess
GetProcessId
GetSystemWindowsDirectoryW
GetPrivateProfileStringW
TerminateProcess
OpenProcess
GetCurrentThreadId
GetCommandLineW
GetLastError
CreateMutexW
MultiByteToWideChar
GetDiskFreeSpaceExW
RemoveDirectoryW
SetCurrentDirectoryW
Sleep
GetTempPathW
CreateThread
WaitForSingleObject
WideCharToMultiByte
GetCurrentProcessId
ProcessIdToSessionId
lstrlenW
OutputDebugStringW
FreeLibrary
GetProcAddress
LoadLibraryW
FindResourceW
LoadResource
LockResource
SizeofResource
VirtualFree
CloseHandle
user32
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
ScreenToClient
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
CopyRect
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
GetKeyState
PeekMessageW
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetCapture
GetParent
ModifyMenuW
EnableMenuItem
CheckMenuItem
PostQuitMessage
CharUpperW
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
EnableWindow
GetCursorPos
SetLayeredWindowAttributes
RedrawWindow
ReleaseDC
SetWindowRgn
GetClientRect
SetTimer
MessageBoxW
GetSystemMetrics
PostMessageW
KillTimer
DisableProcessWindowsGhosting
SendMessageW
LoadIconW
SystemParametersInfoW
PtInRect
GetWindowRect
GetWindowPlacement
GetWindow
LoadCursorW
SetCursor
GetClassNameW
IsWindowVisible
GetWindowTextW
SetForegroundWindow
AttachThreadInput
GetWindowThreadProcessId
GetForegroundWindow
SwitchToThisWindow
ShowWindow
IsWindow
FindWindowW
GetFocus
UnregisterClassW
DestroyMenu
GetSysColorBrush
MoveWindow
SetWindowTextW
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
LoadBitmapW
WinHelpW
gdi32
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
DeleteObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
CreateRoundRectRgn
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegQueryValueW
RegOpenKeyW
CreateWellKnownSid
DuplicateToken
CheckTokenMembership
GetTokenInformation
DuplicateTokenEx
OpenProcessToken
CreateProcessAsUserW
RegSetValueExW
RegEnumKeyW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegDeleteKeyW
RegFlushKey
RegCreateKeyExW
RegCloseKey
RegOpenCurrentUser
RevertToSelf
ImpersonateLoggedOnUser
shell32
ShellExecuteExW
SHGetFolderPathW
SHFileOperationW
SHCreateDirectoryExW
shlwapi
PathAppendW
PathFileExistsW
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathFindExtensionW
ole32
CreateStreamOnHGlobal
oleaut32
VariantChangeType
VariantClear
VariantInit
gdiplus
GdipLoadImageFromStream
GdipDisposeImage
GdipLoadImageFromStreamICM
GdipFree
GdipAlloc
GdipDeleteFontFamily
GdiplusStartup
GdiplusShutdown
GdipCreateFromHDC
GdipDeleteGraphics
GdipDrawImageRectI
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
wtsapi32
WTSQueryUserToken
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 197KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 202KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ