Static task
static1
Behavioral task
behavioral1
Sample
r-d1aa6bfb37491052a815a4d3f8a6e4368fd1a7d448f0eca01f76c545e2674f6b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
r-d1aa6bfb37491052a815a4d3f8a6e4368fd1a7d448f0eca01f76c545e2674f6b.exe
Resource
win10v2004-20230915-en
General
-
Target
r-d1aa6bfb37491052a815a4d3f8a6e4368fd1a7d448f0eca01f76c545e2674f6b
-
Size
148KB
-
MD5
e69970a11f136609f4260478d62476bc
-
SHA1
17b5aa0f8bfefb8e3ce9cf73e672444102e1321c
-
SHA256
d1aa6bfb37491052a815a4d3f8a6e4368fd1a7d448f0eca01f76c545e2674f6b
-
SHA512
45aeada3eab2b732ba479d92b17d7e69adb54efe7d70e50ccb570f449454f2f0655c96da8cf464c6292470cb272b486c8f994b209b266d45d9e3f13003ca424c
-
SSDEEP
1536:37fLP5V1jdumTvS/WhsS90LHM9O94N+Tj66kBWc6BUx/FGa38wY2fbq0Live8HoP:3LpFS5GkHMO9U6CiBM/3fbXkboFOaoy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource r-d1aa6bfb37491052a815a4d3f8a6e4368fd1a7d448f0eca01f76c545e2674f6b
Files
-
r-d1aa6bfb37491052a815a4d3f8a6e4368fd1a7d448f0eca01f76c545e2674f6b.exe windows:4 windows x86
99b991cab655ccd6d284d97ac35c7433
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
GetCPInfo
GetOEMCP
HeapFree
HeapAlloc
RtlUnwind
ExitProcess
TerminateProcess
RaiseException
HeapReAlloc
HeapSize
GetACP
SetStdHandle
GetFileType
GetTimeZoneInformation
GetFileSize
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStartupInfoA
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileAttributesA
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
WaitForSingleObject
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
MultiByteToWideChar
GetProcAddress
DeleteFileA
SetEndOfFile
UnlockFile
LockFile
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
FormatMessageA
LocalFree
LocalAlloc
FreeLibrary
EnterCriticalSection
InterlockedExchange
SetLastError
lstrlenA
lstrcpynA
lstrcpyA
lstrcatA
SetErrorMode
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
CreateDirectoryA
GetModuleFileNameA
CreateMutexA
GetLastError
GetCommandLineA
GetModuleHandleA
GetEnvironmentVariableA
Sleep
user32
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
ShowWindow
LoadCursorA
GetSysColorBrush
DestroyMenu
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetDlgItem
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
LoadStringA
GrayStringA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetLastActivePopup
IsWindowEnabled
MessageBoxA
EnableWindow
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowLongA
GetClassNameA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
SetCursor
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
SendMessageA
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetForegroundWindow
PostQuitMessage
PostMessageA
SetForegroundWindow
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetSystemMetrics
CharUpperA
wsprintfA
DestroyWindow
DrawTextA
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
comctl32
ord17
wininet
InternetGetLastResponseInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetSetOptionExA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
shlwapi
PathIsDirectoryA
Sections
.text Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ