Static task
static1
Behavioral task
behavioral1
Sample
a66a434203c6cb742294bd7bddec57c5bb94c2b8cf1e8170ba2000b9873b2191.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a66a434203c6cb742294bd7bddec57c5bb94c2b8cf1e8170ba2000b9873b2191.exe
Resource
win10v2004-20230915-en
General
-
Target
a66a434203c6cb742294bd7bddec57c5bb94c2b8cf1e8170ba2000b9873b2191
-
Size
5.0MB
-
MD5
e5e44b83b37a5c810ecc714fa9f71d06
-
SHA1
8d6ddbba49249ed05043b96f52e7be0809d003a9
-
SHA256
a66a434203c6cb742294bd7bddec57c5bb94c2b8cf1e8170ba2000b9873b2191
-
SHA512
ffd91b67840ebae7da87d166287b9c08b51fb03bd4799fa9c03757f668d90660324cc9fa14f347d2fcfe181dd5822fbf5a7e70cd4d66904e4120f2c1ca860f30
-
SSDEEP
98304:/NE6DAeJVgdZlKeCLbjFmHOhjemgYmHRMQNLFxYKuzqF:+6DAeJu3lKegbYOhjeLYgMQNLLYKu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a66a434203c6cb742294bd7bddec57c5bb94c2b8cf1e8170ba2000b9873b2191
Files
-
a66a434203c6cb742294bd7bddec57c5bb94c2b8cf1e8170ba2000b9873b2191.exe windows:4 windows x86
b9671dc7aac21f91fec07922555660f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ValidateRect
ReleaseDC
GetDC
GetClientRect
DestroyIcon
DestroyWindow
SetWindowLongA
GetWindow
SendMessageA
TrackPopupMenu
SetMenuDefaultItem
GetMenuState
ReleaseCapture
SetCapture
GetActiveWindow
IsChild
GetFocus
SetActiveWindow
SetWindowPos
SetFocus
GetClassWord
GetParent
EnableMenuItem
GetSystemMenu
MessageBoxA
GetDlgItem
GetWindowLongA
GetSysColorBrush
GetSysColor
GetClassLongA
LoadImageA
FillRect
EnableWindow
ScreenToClient
GetWindowRect
SetParent
GetClassNameA
SetDlgItemTextA
GetDlgItemTextA
SendDlgItemMessageA
CheckDlgButton
IsDlgButtonChecked
IsWindowVisible
InvalidateRect
CreateDialogIndirectParamA
DialogBoxParamA
ShowWindow
AdjustWindowRectEx
GetNextDlgTabItem
MapDialogRect
RedrawWindow
LoadIconA
GetWindowTextLengthA
CreateWindowExA
CallWindowProcA
MapWindowPoints
GetUpdateRect
SetCursor
RegisterClassA
GetClassInfoA
ValidateRgn
DestroyMenu
GetMenuStringA
GetMenuItemInfoA
GetMenuItemCount
LoadStringA
ClientToScreen
GetDesktopWindow
LoadCursorA
SetCursorPos
MessageBeep
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
GetScrollInfo
TranslateMessage
GetMessageA
IsZoomed
IsIconic
CharNextA
EnumChildWindows
GetClipboardData
EnumWindows
MoveWindow
SetScrollPos
DrawMenuBar
CreatePopupMenu
ScrollWindowEx
BringWindowToTop
UnregisterClassA
RegisterWindowMessageA
CreateDialogParamA
SetTimer
GetMessageTime
GetCursorPos
ArrangeIconicWindows
KillTimer
CreateAcceleratorTableA
CreateMenu
LoadMenuA
InsertMenuA
LoadAcceleratorsA
AdjustWindowRect
TranslateAcceleratorA
IsDialogMessageA
BeginPaint
EndPaint
GetSubMenu
IsClipboardFormatAvailable
CheckMenuItem
AppendMenuA
SetMenuItemInfoA
DeleteMenu
GetCaretPos
DestroyAcceleratorTable
SetScrollInfo
GetKeyState
GetDlgCtrlID
SetWindowTextA
EndDialog
UpdateWindow
GetWindowTextA
wsprintfA
PeekMessageA
DispatchMessageA
DefWindowProcA
GetMenu
GetWindowPlacement
SetWindowPlacement
SetMenu
gdi32
Polygon
SetMetaFileBitsEx
SaveDC
ScaleViewportExtEx
SetViewportOrgEx
SetViewportExtEx
PlayMetaFile
RestoreDC
CloseMetaFile
CopyMetaFileA
GetMetaFileBitsEx
DeleteMetaFile
CreateMetaFileA
StretchDIBits
SetWindowOrgEx
SetWindowExtEx
PlayEnhMetaFile
SetEnhMetaFileBits
CreateEnhMetaFileA
ExtCreatePen
Arc
Polyline
UnrealizeObject
SetPaletteEntries
Pie
SelectClipRgn
Ellipse
CreatePatternBrush
GetTextFaceA
CreateFontIndirectA
GetTextExtentPointA
MoveToEx
GetCurrentPositionEx
CreatePen
LineTo
CreateRectRgn
FillRgn
CreatePalette
GetTextExtentPoint32A
GetTextMetricsA
IntersectClipRect
TextOutA
CreateDCA
StartDocA
StartPage
EndPage
EndDoc
GetDIBits
StretchBlt
GetNearestPaletteIndex
SetPixel
Rectangle
CreateICA
SetROP2
SelectPalette
RealizePalette
SetTextAlign
SetBkMode
ExtTextOutA
CloseEnhMetaFile
CopyEnhMetaFileA
GetDeviceCaps
CreateFontA
GetObjectA
CreateCompatibleBitmap
CreateBitmap
GetPixel
GetMapMode
SetMapMode
SetTextColor
SetBkColor
GetNearestColor
CreateSolidBrush
GetStockObject
DeleteObject
DeleteEnhMetaFile
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
kernel32
GetTickCount
ExitProcess
GetDiskFreeSpaceA
GetLocalTime
_llseek
CompareStringW
CompareStringA
GetOEMCP
GetCPInfo
GetTimeZoneInformation
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapCreate
HeapDestroy
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
RtlUnwind
HeapReAlloc
MultiByteToWideChar
UnhandledExceptionFilter
TerminateProcess
HeapFree
HeapAlloc
GetStartupInfoA
FlushFileBuffers
SetThreadPriority
WriteFile
CreateFileMappingA
MapViewOfFile
VirtualQuery
GetCurrentThread
DebugBreak
GetFileInformationByHandle
GetStdHandle
GetTempPathA
GetTempFileNameA
CreateFileA
ReadFile
VirtualFree
VirtualAlloc
GetCurrentProcess
Sleep
RaiseException
SetLastError
SetConsoleCtrlHandler
GetACP
SetEndOfFile
GetFileType
SetFilePointer
_lread
GetProfileStringA
GlobalReAlloc
LocalSize
FreeLibrary
GetModuleHandleA
LoadLibraryA
GetFullPathNameA
lstrcmpiA
lstrcatA
GetProcAddress
GetFileAttributesA
GlobalLock
GlobalUnlock
GetLocaleInfoA
FindResourceA
LoadResource
LockResource
MulDiv
FreeResource
GlobalAlloc
GlobalFree
lstrcmpA
LocalAlloc
LocalFree
_lwrite
lstrlenA
FormatMessageA
lstrcpynA
GetDriveTypeA
GetModuleFileNameA
GetCommandLineA
FindNextFileA
lstrcpyA
FileTimeToDosDateTime
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
SetFileAttributesA
CreateProcessA
WaitForSingleObject
CloseHandle
CopyFileA
MoveFileA
DeleteFileA
GetSystemDirectoryA
SetErrorMode
GetVolumeInformationA
GetCurrentDirectoryA
CreateDirectoryA
RemoveDirectoryA
GetVersion
GetVersionExA
GetEnvironmentVariableA
SetEnvironmentVariableA
WinExec
GetLastError
_lclose
_lcreat
_lopen
_hread
_hwrite
SetCurrentDirectoryA
advapi32
RegQueryValueExA
GetUserNameA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
comdlg32
ChooseColorA
CommDlgExtendedError
PageSetupDlgA
ChooseFontA
FindTextA
GetSaveFileNameA
GetOpenFileNameA
ReplaceTextA
shell32
FindExecutableA
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
winmm
mciSendCommandA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
CODESEG Size: 4KB - Virtual size: 30B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 23.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.trace Size: 188KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ