Static task
static1
Behavioral task
behavioral1
Sample
90cf0faa5e72b3633df463ee804e797ccf080fdd41634cb0b36560bece35eebe.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
90cf0faa5e72b3633df463ee804e797ccf080fdd41634cb0b36560bece35eebe.exe
Resource
win10v2004-20230915-en
General
-
Target
90cf0faa5e72b3633df463ee804e797ccf080fdd41634cb0b36560bece35eebe
-
Size
1.4MB
-
MD5
65baf359b0901bd2c98619869ca54484
-
SHA1
a251a6c491a9ac27e8989b2bcb9c3bf94bef4887
-
SHA256
90cf0faa5e72b3633df463ee804e797ccf080fdd41634cb0b36560bece35eebe
-
SHA512
efa872ebdb8a13a6331015c4ac7357f2f9e7b4af6b75e168753a0e5e7f61c79c2efd01199b9988b6c330514454f0cb7c9de41622cfd54c10b0ee9ae2ede7542d
-
SSDEEP
24576:cM7CKVVVMxPcROUnuXGJYybM56dOA/85RkV4lN/ZDm4yC1jJgyfhLGZ4:DAseGJPM0OAUfkVyN/ZblJLGa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 90cf0faa5e72b3633df463ee804e797ccf080fdd41634cb0b36560bece35eebe
Files
-
90cf0faa5e72b3633df463ee804e797ccf080fdd41634cb0b36560bece35eebe.exe windows:6 windows x86
6df9e06e9a8e140f6b6b79c215bc7dae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
StringFromGUID2
IIDFromString
OleUninitialize
OleInitialize
OleRun
OleSetContainedObject
CoUninitialize
CoInitializeEx
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
shell32
SHGetFolderPathW
FindExecutableA
Shell_NotifyIconA
SHGetFolderPathA
ShellExecuteExA
wininet
InternetCrackUrlA
InternetTimeToSystemTime
InternetTimeFromSystemTime
InternetOpenA
InternetCloseHandle
InternetConnectA
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetErrorDlg
InternetGetConnectedState
user32
SetRect
SetFocus
IsChild
GetAncestor
GetFocus
RegisterClassExA
LoadCursorA
GetParent
GetDesktopWindow
SetWindowLongW
GetWindowThreadProcessId
GetWindowLongW
AdjustWindowRectEx
GetWindowRect
GetClientRect
SetWindowTextW
MessageBoxW
ReleaseDC
GetDC
EnableMenuItem
GetSystemMenu
SetWindowPos
CreateWindowExW
GetClassInfoExW
RegisterClassExW
DefWindowProcW
SendMessageA
IsWindowUnicode
MsgWaitForMultipleObjectsEx
ShowWindow
DestroyWindow
wsprintfA
CharNextA
LoadStringA
GetMessageA
GetMessageW
TranslateMessage
DispatchMessageA
DispatchMessageW
PeekMessageA
PostMessageA
DefWindowProcA
PostQuitMessage
RegisterClassA
GetSystemMetrics
LoadImageA
SetWindowLongA
GetWindowLongA
GetCursorPos
SetForegroundWindow
TrackPopupMenu
AppendMenuA
CreatePopupMenu
CreateWindowExA
comctl32
InitCommonControlsEx
version
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoSizeA
kernel32
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
InitializeSListHead
GetSystemTimeAsFileTime
GetModuleHandleW
GetStartupInfoW
IsProcessorFeaturePresent
GetSystemInfo
UnhandledExceptionFilter
VirtualAlloc
GetConsoleMode
GetFileType
GetStdHandle
GetModuleFileNameW
WriteConsoleW
ExitThread
FreeLibraryAndExitThread
GetDriveTypeW
TlsFree
VirtualProtect
VirtualQuery
SetUnhandledExceptionFilter
GetConsoleOutputCP
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
SetStdHandle
HeapAlloc
HeapFree
HeapSize
HeapReAlloc
GetFullPathNameW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetFileSizeEx
CreateDirectoryW
ReadConsoleW
GetTimeZoneInformation
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
lstrcmpA
GetCommandLineA
GetCurrentDirectoryW
CreateMutexA
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryExA
LoadResource
SizeofResource
lstrcmpiA
FindResourceA
SetDllDirectoryA
MultiByteToWideChar
WideCharToMultiByte
IsDBCSLeadByte
DeleteFileA
WaitForSingleObject
GetExitCodeProcess
LocalFree
FormatMessageA
lstrlenA
SetEvent
ResetEvent
CreateEventA
WaitForMultipleObjects
CreateThread
lstrcpyA
lstrcatA
lstrcpynA
CreateFileA
WriteFile
OpenEventA
Sleep
GetSystemTime
GetTempPathA
GetCurrentProcess
ReadFile
FileTimeToSystemTime
SystemTimeToFileTime
MulDiv
GetCurrentThreadId
LocalAlloc
GetCurrentProcessId
GetLocalTime
FormatMessageW
GetEnvironmentVariableA
FindClose
FindFirstFileA
ExitProcess
TerminateProcess
GetSystemDirectoryA
GetWindowsDirectoryA
LockResource
SetEndOfFile
SetFilePointerEx
GetCommandLineW
SetLastError
GetNativeSystemInfo
GetModuleHandleExW
CreateDirectoryA
FindNextFileA
GetFileAttributesA
RemoveDirectoryA
SetFileAttributesA
GetTickCount
FindFirstFileExW
MoveFileExA
SetHandleInformation
CreatePipe
PeekNamedPipe
CreateProcessA
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
GetModuleHandleExA
OpenThread
GetExitCodeThread
LoadLibraryW
LoadLibraryExW
OpenMutexA
ReleaseMutex
QueryPerformanceCounter
QueryPerformanceFrequency
CreateFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
InitializeCriticalSectionEx
EncodePointer
LCMapStringEx
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
CloseHandle
advapi32
RegEnumKeyA
RegQueryInfoKeyW
RegOpenKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegQueryValueExA
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
oleaut32
SysFreeString
VarUI4FromStr
VariantClear
SysAllocString
VariantInit
VariantChangeType
SysStringByteLen
SysAllocStringByteLen
GetErrorInfo
VariantCopy
shlwapi
ord12
gdi32
GetStockObject
GetDeviceCaps
wintrust
WinVerifyTrust
crypt32
CryptMsgClose
CryptMsgGetParam
CertCloseStore
CertFindCertificateInStore
CertGetNameStringW
CryptQueryObject
CryptStringToBinaryA
CryptBinaryToStringA
CryptProtectData
CryptUnprotectData
msi
ord31
ord159
ord160
ord158
ord91
ord117
ord115
ord44
ord189
ord204
ord67
ord168
ord137
ord141
ord8
Sections
.text Size: 526KB - Virtual size: 526KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 419KB - Virtual size: 418KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 337KB - Virtual size: 340KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ