Static task
static1
Behavioral task
behavioral1
Sample
f221ed0e1ac0ff7281390515be3f8b8ca4e675c834dfafc85097f864de41d23f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f221ed0e1ac0ff7281390515be3f8b8ca4e675c834dfafc85097f864de41d23f.exe
Resource
win10v2004-20230915-en
General
-
Target
f221ed0e1ac0ff7281390515be3f8b8ca4e675c834dfafc85097f864de41d23f
-
Size
2.1MB
-
MD5
cd5e87e3b052ec0cc5afd574f4694e52
-
SHA1
3a21432c183f95ac8e617e4142a18250fbe0131e
-
SHA256
f221ed0e1ac0ff7281390515be3f8b8ca4e675c834dfafc85097f864de41d23f
-
SHA512
d38f994c42385b22b2d21166505a6b97615e096e8276519a993a17e716a3e2c6346b827ba32fb8cb86172c3049e494bd58112388a185bbc1abe03173677eaaca
-
SSDEEP
49152:XgrUgFs8EmU99ou7fZeJhQRspb3AoIUByUoSuDmPFUZXQ1oaQuUupugacO:XgrUgFslT77xihrZ3DITycXQTpuYO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f221ed0e1ac0ff7281390515be3f8b8ca4e675c834dfafc85097f864de41d23f
Files
-
f221ed0e1ac0ff7281390515be3f8b8ca4e675c834dfafc85097f864de41d23f.exe windows x86
34bdc758f312aa4c205dd56ea7417ff0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugBreak
OutputDebugStringW
InterlockedIncrement
GetFileSize
WideCharToMultiByte
ReadProcessMemory
GetCurrentProcessId
VirtualProtectEx
GetProcAddress
InitializeCriticalSection
GetSystemDirectoryW
GetVersionExW
LeaveCriticalSection
EnterCriticalSection
GetExitCodeProcess
WaitForSingleObject
Sleep
DeleteFileW
CreateThread
GetModuleFileNameW
GetCurrentThreadId
DeleteCriticalSection
SetLastError
FlushInstructionCache
GetCurrentProcess
lstrcmpiW
CompareStringW
FreeLibrary
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
CreateFileA
FlushFileBuffers
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
LoadLibraryW
lstrlenA
GetSystemTimeAsFileTime
CreateFileW
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapSize
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
ReadFile
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStartupInfoW
HeapAlloc
HeapFree
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateProcessW
LoadLibraryA
GetLastError
VirtualAllocEx
SetEndOfFile
GetProcessHeap
InterlockedCompareExchange
IsProcessorFeaturePresent
QueueUserAPC
ResumeThread
MoveFileExW
WriteFile
GetModuleHandleW
FindResourceW
SizeofResource
LoadResource
LockResource
GetTickCount
MultiByteToWideChar
SetFilePointer
WriteProcessMemory
TerminateProcess
CloseHandle
InterlockedDecrement
lstrlenW
RaiseException
GetCommandLineW
GetConsoleCP
LocalFree
user32
GetFocus
GetSysColor
IsWindowEnabled
FillRect
DrawFocusRect
CallWindowProcW
GetDlgCtrlID
CreateWindowExW
DrawTextW
ReleaseDC
OffsetRect
SetWindowLongW
GetWindowTextLengthW
GetWindowTextW
SystemParametersInfoW
GetClassNameW
LoadCursorW
ScreenToClient
GetCursorPos
GetCapture
ReleaseCapture
SetFocus
SetCapture
UpdateWindow
PtInRect
SetCursor
InvalidateRect
EndPaint
BeginPaint
CreateDialogParamW
EndDialog
DialogBoxParamW
IsWindow
SetRectEmpty
DestroyWindow
DefWindowProcW
GetDlgItem
PostQuitMessage
CheckDlgButton
IsDlgButtonChecked
GetActiveWindow
SetDlgItemTextW
SetWindowTextW
GetParent
GetWindow
GetWindowRect
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
GetSystemMetrics
LoadImageW
RegisterWindowMessageW
IsDialogMessageW
GetClassInfoW
RegisterClassW
ShowWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
PostMessageW
MessageBoxW
SendMessageW
CharNextW
CharUpperW
LoadStringW
GetDC
UnregisterClassA
gdi32
SetBkMode
GetObjectW
GetStockObject
SelectObject
CreateFontIndirectW
DeleteDC
DeleteObject
SetTextColor
comdlg32
GetOpenFileNameW
advapi32
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
shell32
ShellExecuteW
CommandLineToArgvW
ole32
CoTaskMemFree
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
SysFreeString
VarUI4FromStr
SysAllocString
shlwapi
PathRemoveFileSpecW
SHSetValueW
PathFileExistsW
PathFindFileNameW
comctl32
InitCommonControlsEx
_TrackMouseEvent
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ