Static task
static1
Behavioral task
behavioral1
Sample
06098492c222b291e493fa57f71cea60677f29746994d5574b04756c6b4658a3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
06098492c222b291e493fa57f71cea60677f29746994d5574b04756c6b4658a3.exe
Resource
win10v2004-20230915-en
General
-
Target
06098492c222b291e493fa57f71cea60677f29746994d5574b04756c6b4658a3
-
Size
1.8MB
-
MD5
21fd1bba8db27e6c60362c5f0dfa1b1b
-
SHA1
d2e01c2739affaade84f81d38980c7c8ba503310
-
SHA256
06098492c222b291e493fa57f71cea60677f29746994d5574b04756c6b4658a3
-
SHA512
76c5826ed3e19012b5306a417c38b89925137e0503f85e9aa3f1844616a7592acece78bf2a68750ad13c01bba4d0e228bef94fb726b000133a2c9f3b363a7b0f
-
SSDEEP
24576:rffwBD5uGp//Jt1xu15bnjxf/cEDXC7En11o5EIcMfj1KKptNO5as3kzgGEFc+il:cFAnjxPy7E11o+Ici5KK3NcaITixJwQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06098492c222b291e493fa57f71cea60677f29746994d5574b04756c6b4658a3
Files
-
06098492c222b291e493fa57f71cea60677f29746994d5574b04756c6b4658a3.exe windows:4 windows x86
2723f0b60d846bdbf13c93e8d2e57b5e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
GetFileTime
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
RtlUnwind
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetStartupInfoA
ExitThread
CreateThread
HeapSize
SetStdHandle
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
IsBadReadPtr
IsBadCodePtr
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
GetLocaleInfoW
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedDecrement
WritePrivateProfileStringA
GetTickCount
GetVolumeInformationA
FindClose
GetCurrentProcess
DuplicateHandle
UnlockFile
LockFile
FlushFileBuffers
SetLastError
GlobalFree
MulDiv
GlobalUnlock
LocalFree
CreateEventA
SuspendThread
SetEvent
ResumeThread
GetCurrentThread
GlobalLock
GlobalAlloc
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
InterlockedIncrement
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
WriteFile
ReadFile
GetCurrentProcessId
OpenProcess
ExitProcess
TerminateProcess
Sleep
SetFilePointer
SetEndOfFile
LeaveCriticalSection
EnterCriticalSection
CompareStringW
CompareStringA
lstrlenW
lstrcmpiA
GetVersion
CreateProcessA
GetCommandLineA
GetFileAttributesA
GetFullPathNameA
CreateFileA
GetFileInformationByHandle
MapViewOfFile
GetCurrentDirectoryA
SetCurrentDirectoryA
OutputDebugStringA
MultiByteToWideChar
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CopyFileA
FreeLibrary
LoadLibraryA
GetProcAddress
GetTempPathA
GetTempFileNameA
GetModuleFileNameA
GetFileSize
FormatMessageA
FindFirstFileA
GlobalMemoryStatus
QueryPerformanceFrequency
QueryPerformanceCounter
MoveFileA
SetThreadLocale
CreateMutexA
ReleaseMutex
WaitForSingleObject
DeleteFileA
CreateDirectoryA
WideCharToMultiByte
UnmapViewOfFile
OpenFileMappingA
CreateFileMappingA
MapViewOfFileEx
CloseHandle
GetLastError
lstrlenA
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetFileType
SetEnvironmentVariableW
user32
MessageBeep
GetNextDlgGroupItem
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
LoadCursorA
GetSysColorBrush
DestroyMenu
SetTimer
KillTimer
WaitMessage
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowContextHelpId
MapDialogRect
RegisterClipboardFormatA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
SetCursor
CharNextA
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
WinHelpA
GetCapture
CreateWindowExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
IsChild
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
GetParent
EqualRect
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
IsDialogMessageA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
PostThreadMessageA
CharUpperA
FlashWindow
RegisterWindowMessageA
GetAsyncKeyState
UnregisterClassA
PostQuitMessage
wsprintfA
GetSystemMetrics
LoadIconA
GetClientRect
IsIconic
SendMessageA
EnableWindow
SetWindowsHookExA
gdi32
CreateRectRgnIndirect
Escape
GetRgnBox
GetMapMode
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetClipBox
SetMapMode
RestoreDC
SaveDC
GetTextColor
GetBkColor
GetDeviceCaps
GetStockObject
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
SelectObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegCloseKey
RegQueryValueA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
UrlUnescapeA
oledlg
ord8
ole32
CLSIDFromString
CoDisconnectObject
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRegisterMessageFilter
OleInitialize
CoFreeUnusedLibraries
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromProgID
CoCreateInstance
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleUninitialize
oleaut32
LoadTypeLi
SafeArrayCreate
SafeArrayGetElemsize
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
SystemTimeToVariantTime
LoadRegTypeLi
DispCallFunc
SysAllocStringByteLen
SysStringLen
OleCreateFontIndirect
VariantInit
VariantChangeType
VariantCopy
SysAllocStringLen
SysAllocString
VariantClear
SysFreeString
wininet
InternetConnectA
InternetSetStatusCallback
InternetOpenA
InternetCloseHandle
FtpPutFileA
FtpSetCurrentDirectoryA
FtpCreateDirectoryA
FtpDeleteFileA
InternetCrackUrlA
InternetSetOptionExA
InternetCanonicalizeUrlA
InternetGetLastResponseInfoA
ws2_32
WSAStartup
WSACleanup
closesocket
recvfrom
sendto
connect
WSASetLastError
WSAAsyncSelect
send
recv
accept
socket
select
gethostbyname
htonl
htons
inet_addr
bind
WSAGetLastError
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 488KB - Virtual size: 488KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ