Static task
static1
Behavioral task
behavioral1
Sample
f91e825342c1ec130d727f0bd25229c8fb3f1726ae61ae7c2c7cdc3e60d40dd3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f91e825342c1ec130d727f0bd25229c8fb3f1726ae61ae7c2c7cdc3e60d40dd3.exe
Resource
win10v2004-20230915-en
General
-
Target
f91e825342c1ec130d727f0bd25229c8fb3f1726ae61ae7c2c7cdc3e60d40dd3
-
Size
1.4MB
-
MD5
f8ac99dcfadde908bab8a8ca55c01da0
-
SHA1
01221c99190bd92f25da97e9dcbb0da0c689e4fb
-
SHA256
f91e825342c1ec130d727f0bd25229c8fb3f1726ae61ae7c2c7cdc3e60d40dd3
-
SHA512
7dd216ce64ca2e19ba9b8a2fcf9cef40954216651fc37741627e26123d4cdd1822e988823374f3477fcc6171ec210c04cd6918fdd604f588cb060cc6053fcd35
-
SSDEEP
24576:Kl7EZ2S27p5MAm5bON15a21uDXdikM0Qbki+nbMx0a52XxFX8TFj0:KKZ2S2t+WYDdikM0uixFX8Th
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f91e825342c1ec130d727f0bd25229c8fb3f1726ae61ae7c2c7cdc3e60d40dd3
Files
-
f91e825342c1ec130d727f0bd25229c8fb3f1726ae61ae7c2c7cdc3e60d40dd3.exe windows:4 windows x86
0bf286d926fd2bc8aef90ebc27931469
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
WriteConsoleA
AllocConsole
FreeConsole
QueryPerformanceFrequency
GetLocalTime
SetProcessWorkingSetSize
FlushInstructionCache
GetLocaleInfoW
IsBadCodePtr
IsBadReadPtr
CreatePipe
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
QueryPerformanceCounter
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
HeapSize
GetFileType
SetStdHandle
GetDateFormatA
GetTimeFormatA
GetCommandLineA
GetStartupInfoA
CreateThread
ExitThread
GetDriveTypeA
HeapReAlloc
VirtualAlloc
HeapAlloc
ExitProcess
RtlUnwind
HeapFree
GetOEMCP
GetCPInfo
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
MoveFileA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GlobalFlags
GetCurrentDirectoryA
LocalAlloc
FreeResource
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
InterlockedDecrement
SetErrorMode
GlobalAddAtomA
MulDiv
CreateEventA
ResetEvent
CreateIoCompletionPort
GetQueuedCompletionStatus
SetEvent
CreateNamedPipeA
PostQueuedCompletionStatus
CancelIo
ConnectNamedPipe
SetEnvironmentVariableA
OpenProcess
FormatMessageA
ExpandEnvironmentStringsA
GetSystemDirectoryA
SetLastError
SleepEx
ReleaseMutex
DebugBreak
GetModuleFileNameW
CreateProcessW
SetUnhandledExceptionFilter
VirtualProtect
WriteProcessMemory
lstrcpynA
IsDebuggerPresent
GetSystemTimeAsFileTime
GlobalMemoryStatus
VirtualQuery
FileTimeToDosDateTime
OutputDebugStringA
RaiseException
GetCurrentProcessId
lstrcatA
lstrcpyA
CreateDirectoryA
GetFileTime
GetFullPathNameA
FindNextFileA
GetFileAttributesA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileSize
SetFilePointer
WriteFile
ReadFile
AreFileApisANSI
LocalFree
GetCurrentThread
GlobalDeleteAtom
ConvertDefaultLocale
EnumResourceLanguagesA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleHandleA
GetCurrentThreadId
WritePrivateProfileStringA
DeviceIoControl
CreateFileA
GetSystemInfo
GetCurrentProcess
GetProcessAffinityMask
SetProcessAffinityMask
Sleep
lstrcmpA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
IsDBCSLeadByte
InterlockedIncrement
WideCharToMultiByte
GetPrivateProfileIntA
DeleteFileA
CopyFileA
GetModuleFileNameA
InterlockedExchangeAdd
WinExec
CreateProcessA
CreateMutexA
OpenMutexA
FreeLibrary
CloseHandle
GetProcAddress
LoadLibraryA
GetTickCount
SetCurrentDirectoryA
MultiByteToWideChar
GetLastError
GetVersion
lstrcmpiA
lstrlenW
lstrlenA
LeaveCriticalSection
EnterCriticalSection
CompareStringA
CompareStringW
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
GetPrivateProfileStringA
InitializeCriticalSection
DeleteCriticalSection
TerminateProcess
GetExitCodeProcess
FlushFileBuffers
user32
UnregisterClassA
SetPropA
GetPropA
MessageBoxW
wsprintfA
wvsprintfA
EnumChildWindows
SetCapture
TrackMouseEvent
EqualRect
BeginPaint
EndPaint
UnionRect
IntersectRect
GetKeyState
GetClassInfoExA
SystemParametersInfoA
CreateWindowExA
CallWindowProcA
MoveWindow
GetWindowRgn
DefWindowProcA
RegisterClassExA
DrawEdge
GetSysColor
WindowFromPoint
InflateRect
MapWindowPoints
LoadBitmapA
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
EnableScrollBar
ShowScrollBar
SetScrollRange
GetScrollRange
GetScrollPos
SetScrollPos
GetScrollInfo
SetScrollInfo
GrayStringA
DrawTextExA
TabbedTextOutA
GetDC
IsRectEmpty
AdjustWindowRectEx
DrawTextA
OffsetRect
SetRect
FillRect
ClientToScreen
GetFocus
IsChild
IsZoomed
GetCursor
SetCursor
ReleaseCapture
PostQuitMessage
RedrawWindow
PostMessageA
GetParent
IsWindow
MonitorFromWindow
IsWindowVisible
EnableWindow
GetCursorPos
MonitorFromPoint
GetMonitorInfoA
SetWindowRgn
SetLayeredWindowAttributes
KillTimer
SetTimer
ScreenToClient
GetClientRect
CopyRect
PtInRect
LoadImageA
SendMessageA
CharUpperA
FindWindowA
MessageBoxA
IsIconic
GetForegroundWindow
GetWindowThreadProcessId
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
ShowOwnedPopups
IsWindowEnabled
GetLastActivePopup
ValidateRect
GetActiveWindow
GetMessageA
CallNextHookEx
SetWindowsHookExA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
ModifyMenuA
SetMenuItemBitmaps
UnhookWindowsHookEx
ReleaseDC
GetWindowDC
GetDlgItem
SendDlgItemMessageA
SetWindowTextA
GetDlgCtrlID
SetFocus
GetWindowTextA
GetWindowTextLengthA
GetWindow
GetWindowPlacement
RegisterClassA
GetClassInfoA
DeferWindowPos
GetMenu
TrackPopupMenu
ScrollWindow
GetMessagePos
GetMessageTime
GetTopWindow
EndDeferWindowPos
BeginDeferWindowPos
SetActiveWindow
RemovePropA
GetClassNameA
GetClassLongA
GetCapture
WinHelpA
RegisterWindowMessageA
EndDialog
GetNextDlgTabItem
CreateDialogIndirectParamA
GetDesktopWindow
CopyAcceleratorTableA
InvalidateRgn
DrawIcon
GetSysColorBrush
GetMenuItemInfoA
DestroyMenu
TranslateAcceleratorA
SetMenu
SetRectEmpty
CreatePopupMenu
InsertMenuItemA
LoadAcceleratorsA
ReuseDDElParam
UnpackDDElParam
LoadMenuA
CharNextA
MapDialogRect
SetWindowContextHelpId
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
PostThreadMessageA
CharPrevA
AttachThreadInput
SetForegroundWindow
BringWindowToTop
SwitchToThisWindow
ShowWindow
GetWindowLongA
SetWindowLongA
CreateDialogParamA
GetWindowRect
GetSystemMetrics
SetWindowPos
LoadIconA
LoadCursorA
DestroyWindow
SetDlgItemTextA
UpdateWindow
InvalidateRect
gdi32
SetDIBitsToDevice
GetTextColor
CreatePatternBrush
ExtSelectClipRgn
SetViewportOrgEx
GetPixel
GetWindowExtEx
GetViewportExtEx
GetBkColor
GetMapMode
Ellipse
LPtoDP
CreateEllipticRgn
GetRgnBox
OffsetViewportOrgEx
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
GetGlyphOutlineA
GetTextMetricsA
CombineRgn
ExtCreateRegion
GetClipRgn
SelectClipRgn
CreateRectRgn
PtInRegion
RoundRect
Rectangle
CreatePen
CreateFontA
CreateRectRgnIndirect
BitBlt
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
CreateCompatibleBitmap
StretchBlt
GetTextExtentPoint32A
GetDeviceCaps
SetTextColor
SetBkColor
CreateSolidBrush
CreateRoundRectRgn
CreateFontIndirectA
SetBkMode
GetStockObject
CreateDIBSection
GetObjectA
DeleteObject
SelectObject
DeleteDC
CreateCompatibleDC
SetViewportExtEx
MoveToEx
LineTo
IntersectClipRect
SetMapMode
SetStretchBltMode
RestoreDC
SaveDC
CreateBitmap
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyA
RegOpenKeyA
RegSetValueA
GetUserNameA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
shell32
ShellExecuteA
DragFinish
DragQueryFileA
Shell_NotifyIconA
SHChangeNotify
ShellExecuteExA
ole32
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoFreeUnusedLibraries
CoRegisterMessageFilter
CLSIDFromProgID
CLSIDFromString
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
CoDisconnectObject
OleUninitialize
OleInitialize
oleaut32
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
VariantCopy
VariantChangeType
OleCreateFontIndirect
SysAllocString
SafeArrayDestroy
SystemTimeToVariantTime
VariantClear
SysStringLen
SysAllocStringByteLen
VariantInit
SysFreeString
SysAllocStringLen
LoadTypeLi
msimg32
GradientFill
AlphaBlend
TransparentBlt
comctl32
ImageList_GetImageCount
ImageList_Draw
ImageList_GetImageInfo
_TrackMouseEvent
ImageList_Destroy
ImageList_Create
ord17
ImageList_AddMasked
shlwapi
PathFileExistsA
UrlUnescapeA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
oledlg
ord8
gdiplus
GdiplusShutdown
winmm
timeGetTime
PlaySoundA
iphlpapi
GetAdaptersInfo
ws2_32
getservbyname
gethostbyaddr
getservbyport
__WSAFDIsSet
htonl
bind
ntohs
getsockname
send
select
closesocket
WSAStartup
WSACleanup
WSAGetLastError
inet_ntoa
gethostbyname
inet_addr
WSASetLastError
socket
connect
setsockopt
getpeername
getsockopt
ioctlsocket
recv
gethostname
htons
wininet
HttpOpenRequestA
InternetConnectA
FtpOpenFileA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetSetOptionExA
InternetCanonicalizeUrlA
InternetCrackUrlA
FtpSetCurrentDirectoryA
oleacc
AccessibleObjectFromWindow
CreateStdAccessibleObject
LresultFromObject
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comdlg32
GetFileTitleA
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ