Static task
static1
Behavioral task
behavioral1
Sample
6488869d042ba59044705a840cf79cd921d8a61a61e0d9c3bbe76973801fc1d3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6488869d042ba59044705a840cf79cd921d8a61a61e0d9c3bbe76973801fc1d3.exe
Resource
win10v2004-20230915-en
General
-
Target
6488869d042ba59044705a840cf79cd921d8a61a61e0d9c3bbe76973801fc1d3
-
Size
468KB
-
MD5
82fbefec9387554d309639796fca7730
-
SHA1
f39a12a893fbb5b6d222ad76c666093ee1f2e47c
-
SHA256
6488869d042ba59044705a840cf79cd921d8a61a61e0d9c3bbe76973801fc1d3
-
SHA512
a7da3cdb65797deb0dcd4b51bcd5f6325fb2be8438ec1f4df42ed70c95fad1f962e894183bac3c8f1e07dfa15536cc3c386800cf02b00391747d56d113c0c10c
-
SSDEEP
12288:GXD0r3vTbFWBk03jDiXOdBk3BMb+yJ0Il:GXD0r3rbFak03jOXQO3BMayJ0s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6488869d042ba59044705a840cf79cd921d8a61a61e0d9c3bbe76973801fc1d3
Files
-
6488869d042ba59044705a840cf79cd921d8a61a61e0d9c3bbe76973801fc1d3.exe windows:4 windows x86
ff8a4f2534e9e390124fb7edfae51c19
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentVariableA
GetVersionExA
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
LCMapStringA
LoadLibraryA
FreeLibrary
GetFileSize
GetStartupInfoA
CreateProcessA
DeleteFileA
WriteFile
GetTickCount
CreateDirectoryA
SetFilePointer
GetLocalTime
WritePrivateProfileStringA
GetPrivateProfileStringA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
Sleep
GetModuleFileNameA
GetProcAddress
IsBadReadPtr
HeapReAlloc
ExitProcess
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcmpA
lstrlenA
ReleaseMutex
WaitForSingleObject
CreateMutexA
VirtualFree
VirtualAlloc
lstrcmpiW
lstrcmpW
lstrlenW
HeapCreate
HeapDestroy
RtlZeroMemory
InterlockedDecrement
InterlockedIncrement
Process32Next
Process32First
MultiByteToWideChar
HeapFree
HeapAlloc
GetProcessHeap
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
ReadFile
GetFileSizeEx
CreateFileA
GetComputerNameExA
WideCharToMultiByte
CloseHandle
lstrcpynA
OpenProcess
Module32First
CreateToolhelp32Snapshot
lstrcatA
RtlMoveMemory
CreateThread
RtlUnwind
GetCommandLineA
SetDllDirectoryA
GetLastError
GetOEMCP
GetCPInfo
FlushFileBuffers
GetCurrentProcess
SetErrorMode
GetProcessVersion
FindResourceA
LoadResource
LockResource
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetLastError
lstrcpyA
GlobalFlags
MulDiv
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalFree
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
GlobalDeleteAtom
LocalAlloc
ws2_32
WSACleanup
gethostname
WSAStartup
WSAGetLastError
ole32
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
OleFlushClipboard
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleIsCurrentClipboard
shlwapi
PathRemoveBackslashA
PathRemoveFileSpecA
PathFindExtensionA
PathGetArgsA
StrToIntExW
StrToIntW
PathFileExistsA
PathFindFileNameA
user32
UnregisterClassA
wsprintfA
MessageBoxA
GetWindowThreadProcessId
DestroyMenu
CreateDialogIndirectParamA
EndDialog
PostThreadMessageA
LoadStringA
GetSysColorBrush
LoadCursorA
LoadIconA
UpdateWindow
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
DestroyWindow
CreateWindowExA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
PeekMessageA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMessageA
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
gdi32
GetObjectA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
comctl32
ord17
oledlg
ord8
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantInit
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
Sections
.text Size: 404KB - Virtual size: 403KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE