Static task
static1
Behavioral task
behavioral1
Sample
29135208544bc1bbff9569e421b66b8d46c312981c392f476e01504dd5c5ad43.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
29135208544bc1bbff9569e421b66b8d46c312981c392f476e01504dd5c5ad43.exe
Resource
win10v2004-20230915-en
General
-
Target
28e16d8135f7d78f890f784453b06306.bin
-
Size
862KB
-
MD5
da0c0acb49b05de9711653d55eee51a2
-
SHA1
adc1a3847b77c3a89402763144994287b17bd313
-
SHA256
54c1707639bb5159ee9214d86fcf1eb29507267cdb08c733c1064000e6edca1f
-
SHA512
9cdaa35fafa618f1dd97d67a403af3999b364734dbf16c3d5c5d9ea69ea2185ac2c4b43d4571045f5f571b4a781ee062328d9dfc917b9ba378112f80d7b338c1
-
SSDEEP
24576:2RDlfy2Y4HP+2VT45xQ3HwApyOsXQSadI9G:25lq2THP+OT4CKOYZadI9G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/29135208544bc1bbff9569e421b66b8d46c312981c392f476e01504dd5c5ad43.bin
Files
-
28e16d8135f7d78f890f784453b06306.bin.zip
Password: infected
-
29135208544bc1bbff9569e421b66b8d46c312981c392f476e01504dd5c5ad43.bin.exe windows:5 windows x86
Password: infected
717e19ecee9a2b69b3eed8ee09bd5b5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleCP
GetConsoleMode
CompareStringW
GetLocaleInfoW
WriteConsoleA
GetEnvironmentStringsW
WriteConsoleW
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
IsValidCodePage
GetACP
GetStdHandle
SetHandleCount
WideCharToMultiByte
HeapSize
GetFileType
SetStdHandle
ExitThread
VirtualQuery
GetSystemInfo
VirtualAlloc
RaiseException
RtlUnwind
HeapReAlloc
QueryPerformanceCounter
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
FindResourceExA
VirtualProtect
GetProfileIntA
GetTickCount
SearchPathA
GetSystemDirectoryW
LoadLibraryW
GetTempPathA
GetTempFileNameA
GetOEMCP
GetCPInfo
lstrcpyA
GlobalFlags
GetCurrentDirectoryA
GetFileTime
GetFileSizeEx
GetFileAttributesA
FileTimeToLocalFileTime
SetErrorMode
TlsFree
DeleteCriticalSection
VirtualFree
HeapFree
HeapCreate
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetModuleHandleW
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GlobalAddAtomA
ResumeThread
SetThreadPriority
WritePrivateProfileStringA
GetPrivateProfileIntA
FreeResource
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GetCurrentProcessId
GlobalFree
CopyFileA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
lstrlenW
MulDiv
lstrlenA
MultiByteToWideChar
lstrcpynA
GetModuleHandleA
SetLastError
WaitForMultipleObjects
Sleep
GetDriveTypeA
GetLogicalDriveStringsA
QueryDosDeviceA
DeviceIoControl
CreateFileA
CreateThread
CloseHandle
GetLastError
CreateMutexA
ReleaseMutex
WaitForSingleObject
GetProcAddress
LoadLibraryA
OutputDebugStringA
GetModuleFileNameA
FileTimeToSystemTime
FindResourceA
LoadResource
LockResource
SizeofResource
GetConsoleOutputCP
user32
MapVirtualKeyExA
IsCharLowerA
GetMenuDefaultItem
SetMenuDefaultItem
UpdateLayeredWindow
EnableScrollBar
UnionRect
SetCursorPos
DrawIconEx
DrawFocusRect
DrawFrameControl
DrawEdge
UnpackDDElParam
ReuseDDElParam
InsertMenuItemA
TranslateAcceleratorA
UnregisterClassA
GetNextDlgGroupItem
InvalidateRgn
SetRect
CharNextA
EmptyClipboard
CloseClipboard
SetClipboardData
LoadImageA
DestroyIcon
CopyImage
OpenClipboard
DrawStateA
RegisterClipboardFormatA
EnumChildWindows
LockWindowUpdate
BringWindowToTop
KillTimer
SetTimer
IsMenu
SetClassLongA
SetParent
CreatePopupMenu
NotifyWinEvent
SetWindowRgn
CreateAcceleratorTableA
LoadAcceleratorsA
DestroyAcceleratorTable
GetAsyncKeyState
GetKeyboardState
GetKeyboardLayout
ToAsciiEx
CopyAcceleratorTableA
PostThreadMessageA
LoadMenuA
SetRectEmpty
DeleteMenu
WaitMessage
WindowFromPoint
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
DestroyMenu
GetMenuItemInfoA
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
CheckRadioButton
CheckDlgButton
SendDlgItemMessageA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
IsClipboardFormatAvailable
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
ShowScrollBar
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
IntersectRect
GetWindowPlacement
ShowOwnedPopups
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
MapVirtualKeyA
GetKeyNameTextA
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
WinHelpA
SystemParametersInfoA
OffsetRect
MessageBeep
RedrawWindow
IsZoomed
DefFrameProcA
DefMDIChildProcA
DrawMenuBar
TranslateMDISysAccel
GetUpdateRect
CharUpperBuffA
CopyIcon
SubtractRect
PostQuitMessage
CharUpperA
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
GetMenuState
GetMenuStringA
GetMenuItemID
InsertMenuA
DestroyCursor
GetWindowRgn
CreateMenu
GetDoubleClickTime
RemovePropA
GetIconInfo
GetMenuItemCount
GetSubMenu
RemoveMenu
ScreenToClient
UpdateWindow
FillRect
PtInRect
GetFocus
IsRectEmpty
GrayStringA
DrawTextExA
TabbedTextOutA
DrawTextA
FrameRect
InflateRect
ReleaseCapture
ReleaseDC
GetSysColor
GetDC
SetCapture
IsWindow
SetForegroundWindow
CopyRect
RegisterWindowMessageA
PostMessageA
GetWindowRect
RegisterDeviceNotificationA
DispatchMessageA
TranslateMessage
PeekMessageA
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
AppendMenuA
GetSystemMenu
LoadIconA
EnableWindow
GetParent
InvalidateRect
SendMessageA
ShowWindow
gdi32
GetObjectType
CreatePen
CreateSolidBrush
CreateHatchBrush
SetRectRgn
CombineRgn
GetMapMode
DPtoLP
OffsetRgn
GetRgnBox
CreateDIBitmap
GetTextMetricsA
EnumFontFamiliesA
GetTextCharsetInfo
CreateRoundRectRgn
GetTextColor
SetDIBColorTable
GetDIBits
RealizePalette
StretchBlt
SetPixel
CreateDIBSection
CreateEllipticRgn
CreatePolygonRgn
Polyline
Ellipse
Polygon
GetStockObject
GetPaletteEntries
GetWindowOrgEx
PtInRegion
FillRgn
FrameRgn
GetBoundsRect
GetViewportOrgEx
LPtoDP
ExtFloodFill
SetPaletteEntries
GetNearestPaletteIndex
GetSystemPaletteEntries
EnumFontFamiliesExA
GetTextFaceA
SetPixelV
RoundRect
SelectPalette
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetPixel
GetWindowExtEx
GetViewportExtEx
SelectClipRgn
CreatePalette
Rectangle
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
GetDCOrgEx
CreateBitmap
PatBlt
CreateRectRgnIndirect
CopyMetaFileA
GetDeviceCaps
CreateFontIndirectA
CreateRectRgn
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetTextExtentPoint32A
GetBkColor
GetObjectA
GetCurrentObject
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
RegCloseKey
RegQueryValueA
shell32
ShellExecuteA
SHGetFileInfoA
DragQueryFileA
DragFinish
ShellExecuteExA
SHAppBarMessage
SHBrowseForFolderA
SHGetPathFromIDListA
comctl32
InitCommonControlsEx
ImageList_GetIconSize
shlwapi
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathRemoveFileSpecW
oledlg
ord8
ole32
OleGetClipboard
DoDragDrop
OleFlushClipboard
OleIsCurrentClipboard
OleLockRunning
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
CoTaskMemFree
IsAccelerator
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRegisterMessageFilter
CoRevokeClassObject
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
OleTranslateAccelerator
OleDestroyMenuDescriptor
CoInitializeEx
OleCreateMenuDescriptor
oleaut32
VariantClear
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
SafeArrayDestroy
VariantCopy
VariantInit
SysAllocStringLen
SysAllocStringByteLen
SysFreeString
SysStringLen
VariantTimeToSystemTime
VariantChangeType
gdiplus
GdipDrawImageI
GdipGetImageGraphicsContext
GdiplusShutdown
GdiplusStartup
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
GdipCloneImage
imm32
ImmGetOpenStatus
ImmReleaseContext
ImmGetContext
winmm
PlaySoundA
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 278KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ