Static task
static1
Behavioral task
behavioral1
Sample
1f696525f7f67bb7f313fe232bf5259366f2fe75180d4b59dd144f3873b6a280.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1f696525f7f67bb7f313fe232bf5259366f2fe75180d4b59dd144f3873b6a280.exe
Resource
win10v2004-20230915-en
General
-
Target
1f696525f7f67bb7f313fe232bf5259366f2fe75180d4b59dd144f3873b6a280
-
Size
2.0MB
-
MD5
ee8f3f0187414d4d7cc3393398c63f04
-
SHA1
2e07585ad0850ba31e7cc51ce13108b441ea230e
-
SHA256
1f696525f7f67bb7f313fe232bf5259366f2fe75180d4b59dd144f3873b6a280
-
SHA512
94edce2e6cd6a33ab912cd38e4e615b4612ac92cc1f9b5cf7e666a1382f8dbacd9e6e44765bef446280432d702f5f5287d5d39d708ee3ace950049b0008ac42e
-
SSDEEP
24576:K5Yv+NPUvffBUokO/nK3ltwzLEH7CpGr5GTljFqrCcSLx:yY5fB5kOSVGzwbC01GDq+TLx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1f696525f7f67bb7f313fe232bf5259366f2fe75180d4b59dd144f3873b6a280
Files
-
1f696525f7f67bb7f313fe232bf5259366f2fe75180d4b59dd144f3873b6a280.exe windows:5 windows x64
13a56e9063034f290906d2725ae4db89
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetStartupInfoW
HeapReAlloc
RtlLookupFunctionEntry
RtlUnwindEx
RaiseException
RtlPcToFileHeader
Sleep
ExitProcess
HeapQueryInformation
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
CreateFileA
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetErrorMode
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringW
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
lstrlenA
GlobalGetAtomNameW
CloseHandle
FreeResource
GlobalAddAtomW
GlobalFindAtomW
GetVersionExW
CompareStringW
GetVersionExA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
lstrcmpW
GetModuleHandleA
GetCurrentProcessId
GetModuleFileNameW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
lstrlenW
MulDiv
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleW
LoadLibraryW
GetLastError
FindResourceW
LoadResource
LockResource
SizeofResource
HeapAlloc
GetNativeSystemInfo
GetProcessHeap
HeapFree
VirtualProtect
VirtualFree
FreeLibrary
GetProcAddress
SetLastError
LoadLibraryA
GetTickCount
VirtualAlloc
user32
SetTimer
KillTimer
WindowFromPoint
GetDCEx
LockWindowUpdate
SetCapture
RegisterWindowMessageW
SendDlgItemMessageA
SendDlgItemMessageW
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassNameW
GetClassLongPtrW
SetPropW
GetPropW
RemovePropW
GetFocus
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
SetActiveWindow
DispatchMessageW
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
GetWindowLongPtrW
SetWindowLongPtrW
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
SetRect
EqualRect
DeferWindowPos
GetDlgCtrlID
CallWindowProcW
PtInRect
GetMenu
SetWindowLongW
SetWindowPos
OffsetRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
UnhookWindowsHookEx
PostMessageW
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
FillRect
GetDC
ReleaseDC
IntersectRect
InflateRect
CopyRect
GetWindowThreadProcessId
GetWindowLongW
GetParent
GetLastActivePopup
IsWindowEnabled
MessageBoxW
GetMenuState
DefWindowProcW
LoadCursorW
LoadIconW
DeleteMenu
AppendMenuW
GetMenuItemID
GetMenuItemCount
GetSubMenu
EnableWindow
GetClientRect
InvalidateRect
GetSysColor
SendMessageW
GetSystemMetrics
SystemParametersInfoW
GetMenuItemInfoW
UnregisterClassW
GetSysColorBrush
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
GetSystemMenu
SetParent
IsRectEmpty
UnpackDDElParam
ReuseDDElParam
LoadMenuW
DestroyMenu
ReleaseCapture
LoadAcceleratorsW
InsertMenuItemW
CreatePopupMenu
SetRectEmpty
BringWindowToTop
GetDesktopWindow
TranslateAcceleratorW
ShowOwnedPopups
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetMessageW
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
ShowWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemInt
AdjustWindowRectEx
IsWindow
gdi32
CreateBitmap
SaveDC
RestoreDC
SetBkMode
SetTextColor
SetMapMode
GetClipBox
ExcludeClipRect
IntersectClipRect
LineTo
MoveToEx
SelectClipRgn
GetObjectW
GetPixel
PtVisible
RectVisible
CreatePatternBrush
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
CreateSolidBrush
GetCharWidthW
CreateFontW
StretchDIBits
GetTextExtentPoint32W
GetBkColor
PatBlt
DeleteObject
BitBlt
CombineRgn
SetRectRgn
CreateRectRgnIndirect
CreateRectRgn
CreateFontIndirectW
SetBkColor
ExtTextOutW
TextOutW
Ellipse
CreateCompatibleBitmap
CreateCompatibleDC
SetPixel
GetDeviceCaps
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
DragFinish
DragQueryFileW
shlwapi
PathFindFileNameW
PathFindExtensionW
oleaut32
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 253KB - Virtual size: 253KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.6MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ