Static task
static1
Behavioral task
behavioral1
Sample
fe4d7557566a10aa8e29377bbfcd7f7241be5d359afa78b7f34fecd19ddfc964.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fe4d7557566a10aa8e29377bbfcd7f7241be5d359afa78b7f34fecd19ddfc964.exe
Resource
win10v2004-20230915-en
General
-
Target
fe4d7557566a10aa8e29377bbfcd7f7241be5d359afa78b7f34fecd19ddfc964
-
Size
9.7MB
-
MD5
c1145d51a300bf2afcf4d688905a1155
-
SHA1
4bd3ab1cb3839cbca8cb592f012cf31a04ef274e
-
SHA256
fe4d7557566a10aa8e29377bbfcd7f7241be5d359afa78b7f34fecd19ddfc964
-
SHA512
4ff77a407ed645f33d2c808cbdda33ef6d0889e07fcef1d382935bd65b5deeea2b8f34c96923e1bb6699975b3a8b4d92417accd5ab11e4f1747451929c3f447f
-
SSDEEP
196608:ECHQOVOHj2RZGWKVgp0IL5ujk4PhkVgcgd3/xOM/PMa7SC3N:ECHZ8yRiHISTaVgcgdvHPDx3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe4d7557566a10aa8e29377bbfcd7f7241be5d359afa78b7f34fecd19ddfc964
Files
-
fe4d7557566a10aa8e29377bbfcd7f7241be5d359afa78b7f34fecd19ddfc964.exe windows:5 windows x86
632b01bf7c45a00424ea0156e54d3e2e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
RtlUnwind
ExitProcess
RaiseException
HeapSize
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
GetCurrentProcess
FlushFileBuffers
GetThreadLocale
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
FormatMessageW
LocalFree
MulDiv
GetModuleHandleA
GlobalFindAtomW
CompareStringW
LoadLibraryA
SetErrorMode
InterlockedDecrement
GetCurrentProcessId
SetLastError
GlobalAddAtomW
GlobalUnlock
GlobalFree
FreeResource
lstrlenW
WritePrivateProfileStringW
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
HeapFree
lstrcmpA
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
GetModuleHandleW
GetProcAddress
VerifyVersionInfoW
VerSetConditionMask
DefineDosDeviceW
VirtualFree
VirtualAlloc
SetFilePointer
GetDriveTypeW
GetTickCount
Sleep
DeleteCriticalSection
InitializeCriticalSection
HeapAlloc
lstrlenA
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetStdHandle
GetStartupInfoW
GetLastError
CreatePipe
GetSystemDirectoryW
DeviceIoControl
WideCharToMultiByte
ReadFile
GetModuleFileNameW
MultiByteToWideChar
CloseHandle
WriteFile
CreateFileW
LockResource
GetCommandLineW
SizeofResource
GetVersionExA
GetVersion
GetVersionExW
GetSystemTimeAsFileTime
GetModuleHandleA
CreateEventA
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
LoadLibraryA
FreeLibrary
GetTickCount
SystemTimeToFileTime
FileTimeToSystemTime
GlobalFree
LocalAlloc
LocalFree
GetProcAddress
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
GetLastError
FlushFileBuffers
WriteConsoleW
SetStdHandle
IsProcessorFeaturePresent
DecodePointer
GetCommandLineA
RaiseException
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringW
GetStringTypeW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapSize
WriteFile
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapReAlloc
VirtualQuery
user32
GetSysColorBrush
LoadCursorW
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
PtInRect
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
SetWindowPos
SetFocus
ShowWindow
SetWindowLongW
GetDlgCtrlID
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
SendDlgItemMessageW
GetWindow
GetSysColor
DestroyMenu
CopyRect
UnhookWindowsHookEx
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
GetMenuItemID
UnregisterClassW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
PostQuitMessage
PostMessageW
wsprintfW
EnableWindow
DrawIcon
GetClientRect
GetSystemMetrics
SendMessageW
IsIconic
AppendMenuW
GetSystemMenu
LoadIconW
UnregisterClassA
CharUpperBuffW
gdi32
DeleteDC
GetStockObject
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
RectVisible
PtVisible
CreateBitmap
DeleteObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
ExtTextOutW
GetObjectW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegSetValueExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
OpenSCManagerW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
StartServiceW
QueryServiceStatus
CloseServiceHandle
OpenServiceW
shell32
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionW
PathFindFileNameW
ole32
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
oleaut32
SysAllocString
VariantInit
VariantClear
SafeArrayGetElement
VariantChangeType
ws2_32
gethostbyname
WSACleanup
inet_ntoa
WSAStartup
gethostname
Sections
.text Size: 376KB - Virtual size: 376KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.M&6 Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Q@_ Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.oN| Size: 5.9MB - Virtual size: 5.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE