Static task
static1
Behavioral task
behavioral1
Sample
ffb5bf04197699669c3f9027385540237affc8a95e240e32779421db393aa6c9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ffb5bf04197699669c3f9027385540237affc8a95e240e32779421db393aa6c9.exe
Resource
win10v2004-20230915-en
General
-
Target
ffb5bf04197699669c3f9027385540237affc8a95e240e32779421db393aa6c9
-
Size
8.0MB
-
MD5
6eff37e270a4bbd1da10e49a1c485393
-
SHA1
e7422afc9d71ca48cfdeeb5fec42bcde69e94764
-
SHA256
ffb5bf04197699669c3f9027385540237affc8a95e240e32779421db393aa6c9
-
SHA512
978a4f4996bd01904640131334490b2392bc85b33f4e55f07024a01daf979fba17a34edffa3e939d62a729aa2dfc4ec3a9d07395fb41ceadfcbe888b362f38b5
-
SSDEEP
98304:UkRHKaJjVPa8EgiRL+R2/bDzL/SeaSJVsOJaMVm9TM/22Es:XHKaJjVPa8EgiNG2/vSeJi6axWj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ffb5bf04197699669c3f9027385540237affc8a95e240e32779421db393aa6c9
Files
-
ffb5bf04197699669c3f9027385540237affc8a95e240e32779421db393aa6c9.exe windows:6 windows x64
cf29499aad65c48276a856f2de893f6d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SizeofResource
LockResource
LoadResource
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
CreateEventA
SetEvent
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
FindResourceW
GlobalAlloc
GlobalLock
GlobalFree
LocalFree
FormatMessageA
FormatMessageW
SetDllDirectoryW
WideCharToMultiByte
GetLocaleInfoW
GetUserDefaultUILanguage
HeapAlloc
HeapDestroy
SetLastError
SleepEx
QueryPerformanceFrequency
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
QueryPerformanceCounter
GetTickCount
Sleep
MultiByteToWideChar
MoveFileExA
WaitForSingleObjectEx
CompareFileTime
GetSystemTimeAsFileTime
GetEnvironmentVariableA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
VerSetConditionMask
VerifyVersionInfoW
GetEnvironmentVariableW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
WriteFile
GetModuleHandleW
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
LoadLibraryW
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
GetSystemInfo
VirtualProtect
GetLastError
LoadLibraryExA
GetGeoInfoW
GetUserGeoID
GetStringTypeExW
LCMapStringW
GetSystemDefaultUILanguage
GetUserDefaultLCID
GetLocaleInfoEx
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
DeleteFileW
FindFirstFileExW
GetDiskFreeSpaceExW
GetFileAttributesExW
GetFileInformationByHandle
GetLongPathNameW
GetTempFileNameW
SetFilePointer
GetTempPathW
IsWow64Process
CopyFileW
MoveFileExW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
LoadLibraryExW
EnumResourceNamesW
OutputDebugStringW
RtlUnwind
GetModuleFileNameW
ResetEvent
GetThreadLocale
SetThreadLocale
GetFileAttributesW
GetFileSizeEx
FreeResource
ReleaseMutex
WaitForSingleObject
CreateMutexA
GlobalReAlloc
GlobalSize
GlobalUnlock
MulDiv
FindResourceExW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
OpenEventW
OpenProcess
LocalAlloc
QueryFullProcessImageNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DosDateTimeToFileTime
CompareStringW
GetVolumeInformationW
GetSystemDirectoryW
GetComputerNameW
GetFileSize
InitializeCriticalSection
TryEnterCriticalSection
ProcessIdToSessionId
GetVersionExW
GetCurrentPackageFamilyName
CreateThread
SetThreadPriority
GetThreadPriority
TerminateThread
GetExitCodeThread
FreeConsole
AttachConsole
GetConsoleDisplayMode
FindResourceA
GetLocaleInfoA
CreateDirectoryA
IsDebuggerPresent
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
VirtualAlloc
VirtualFree
GetStringTypeW
CreateEventW
SwitchToThread
GetCPInfo
ReleaseSemaphore
WaitForMultipleObjectsEx
OpenEventA
SetWaitableTimer
ResumeThread
GetLogicalProcessorInformation
CreateWaitableTimerA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
SignalObjectAndWait
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
SetProcessAffinityMask
DuplicateHandle
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlPcToFileHeader
RtlUnwindEx
ExitProcess
GetModuleHandleExW
GetDriveTypeW
ExitThread
SetFilePointerEx
SetConsoleCtrlHandler
GetConsoleCP
GetDateFormatW
GetTimeFormatW
IsValidLocale
EnumSystemLocalesW
FlushFileBuffers
SetStdHandle
SetEndOfFile
SetCurrentDirectoryW
GetCurrentDirectoryW
GetFullPathNameW
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
WriteConsoleW
SetUnhandledExceptionFilter
RaiseException
CloseHandle
DecodePointer
CreateFileW
RtlCaptureStackBackTrace
AreFileApisANSI
HeapCreate
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
GetFullPathNameA
UnlockFileEx
CreateMutexW
UnmapViewOfFile
HeapValidate
SetDefaultDllDirectories
GetTempPathA
GetDiskFreeSpaceA
GetFileAttributesA
FlushViewOfFile
MapViewOfFile
CreateFileMappingW
LockFileEx
UnlockFile
HeapCompact
DeleteFileA
GetCurrentThread
CreateFileA
VirtualQuery
CreateDirectoryW
gdiplus
GdipCreateImageAttributes
GdipDisposeImageAttributes
GdipSetImageAttributesWrapMode
GdipSetCompositingMode
GdipSetSmoothingMode
GdipSetInterpolationMode
GdipCreateBitmapFromScan0
GdipSaveImageToFile
GdiplusShutdown
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdipFree
GdiplusStartup
GdipCreateBitmapFromHBITMAP
GdipSetStringFormatTrimming
GdipSetStringFormatFlags
GdipDrawImageRectRectI
GdipAlloc
GdipDeleteStringFormat
GdipCreateStringFormat
GdipMeasureString
GdipDrawString
GdipDeleteFont
GdipCreateFont
GdipGetGenericFontFamilySansSerif
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipSetClipRectI
GdipDrawImageRectRect
GdipDrawImage
GdipFillPath
GdipFillEllipse
GdipFillRectangle
GdipGraphicsClear
GdipDrawRectangle
GdipDrawLines
GdipDrawLine
GdipSetTextRenderingHint
GdipSetCompositingQuality
GdipCreateFromHWNDICM
GdipCreateFromHWND
GdipCreateFromHDC
GdipFlush
GdipSetImageAttributesColorMatrix
GdipDeletePen
GdipCreatePen1
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipAddPathLine
GdipClosePathFigures
GdipDeletePath
GdipCreatePath
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipBitmapSetPixel
GdipBitmapGetPixel
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipDeleteGraphics
GdipCreateBitmapFromHICON
comctl32
ImageList_Create
ImageList_Destroy
ord413
ord410
ImageList_ReplaceIcon
wldap32
ord27
ord32
ord211
ord60
ord33
ord26
ord22
ord301
ord200
ord30
ord79
ord41
ord50
ord143
ord35
ord45
ord217
ord46
normaliz
IdnToAscii
IdnToUnicode
dbghelp
MiniDumpWriteDump
gdi32
CreateCompatibleDC
CreateDIBSection
GetDIBits
CreateCompatibleBitmap
GetObjectW
GetTextExtentPoint32W
TextOutW
LPtoDP
DeleteDC
GetTextMetricsW
SetTextColor
CreateSolidBrush
CreateBitmap
SetMapMode
SetBkMode
SetBkColor
SelectObject
AddFontMemResourceEx
GetStockObject
GetDeviceCaps
DeleteObject
CreateFontW
CreateFontIndirectW
advapi32
SetSecurityInfo
CryptGetHashParam
CryptHashData
OpenProcessToken
RegOpenKeyExW
RegQueryValueExW
RegDeleteTreeW
RegEnumValueW
RegCreateKeyExW
RegEnumKeyExW
OpenThreadToken
RegOpenKeyW
SetEntriesInAclW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
ConvertStringSidToSidW
AddAccessAllowedAceEx
AddAce
DuplicateTokenEx
GetAce
GetAclInformation
GetLengthSid
GetSecurityDescriptorSacl
GetTokenInformation
InitializeAcl
GetUserNameW
ConvertSidToStringSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityInfo
RegCopyTreeW
LookupAccountNameW
RegDeleteValueW
RegSetValueExW
GetSidSubAuthority
RegQueryInfoKeyW
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
RegFlushKey
RegCloseKey
DeregisterEventSource
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
shell32
SHGetPropertyStoreForWindow
ShellExecuteW
SHFileOperationW
SHGetFileInfoW
SHGetMalloc
SHQueryUserNotificationState
SHBindToParent
SHAppBarMessage
SHEvaluateSystemCommandTemplate
ShellExecuteExW
CommandLineToArgvW
SHGetSettings
SHGetDesktopFolder
SHGetKnownFolderPath
SHGetFolderPathW
SHCreateDirectoryExW
ole32
CoUninitialize
StringFromGUID2
PropVariantClear
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CoCreateGuid
CoSetProxyBlanket
CoInitializeEx
CoInitializeSecurity
oleaut32
VariantClear
VariantInit
SysAllocString
SysAllocStringLen
CreateErrorInfo
SetErrorInfo
VariantChangeType
GetErrorInfo
SysStringLen
VariantCopy
SysFreeString
bcrypt
BCryptGenRandom
msi
ord173
ord217
rpcrt4
RpcStringFreeW
UuidCreateSequential
UuidToStringW
wininet
DeleteUrlCacheEntryW
InternetQueryOptionW
winhttp
WinHttpOpen
WinHttpCloseHandle
WinHttpGetProxyForUrl
crypt32
CertOpenSystemStoreA
CertFreeCertificateContext
CertFindCertificateInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
userenv
GetUserProfileDirectoryW
ExpandEnvironmentStringsForUserW
shlwapi
SHRegDuplicateHKey
PathFileExistsW
AssocQueryStringW
StrChrIW
ord487
StrRetToBufW
PathGetArgsW
ord176
version
VerQueryValueW
ws2_32
ioctlsocket
gethostname
gethostbyname
getnameinfo
recvfrom
freeaddrinfo
getaddrinfo
listen
htonl
accept
select
__WSAFDIsSet
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
shutdown
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
bind
recv
WSAGetLastError
closesocket
WSAWaitForMultipleEvents
WSASetEvent
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
sendto
connect
wtsapi32
WTSEnumerateSessionsW
WTSFreeMemory
WTSQueryUserToken
secur32
GetUserNameExW
comdlg32
GetSaveFileNameW
Sections
.text Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 198KB - Virtual size: 197KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 604KB - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE