Static task
static1
Behavioral task
behavioral1
Sample
9602c699ed97ab4bc3b06940813f3bd7b8780ff1770be1915313b085834baf77.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9602c699ed97ab4bc3b06940813f3bd7b8780ff1770be1915313b085834baf77.exe
Resource
win10v2004-20230915-en
General
-
Target
9602c699ed97ab4bc3b06940813f3bd7b8780ff1770be1915313b085834baf77
-
Size
1.4MB
-
MD5
f5ba388900154a0d6f1ce76049e2f129
-
SHA1
6029ef8771e7664740d3d025212829d14a1754f9
-
SHA256
9602c699ed97ab4bc3b06940813f3bd7b8780ff1770be1915313b085834baf77
-
SHA512
fbdadb182a296dbdc30f5850d56a0cd1a272c366649be6d84a269625f3fc36540232fbcd5b83f20974a77da8ba77495a2c319ad5e484739cbd982137477df533
-
SSDEEP
24576:nm7Ey+sesOtZyKxDNxfu46WyoBui0f325KOfrB03wJ6zPSuQC:nm7WseFtZnNs4T3But25KSrymuQC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9602c699ed97ab4bc3b06940813f3bd7b8780ff1770be1915313b085834baf77
Files
-
9602c699ed97ab4bc3b06940813f3bd7b8780ff1770be1915313b085834baf77.exe windows:6 windows x64
2060ad892f6464ea50ee4c5d286aa5cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetProcessHeap
lstrcmpiA
CreateProcessA
GetComputerNameW
Beep
HeapAlloc
LoadResource
CloseHandle
Process32Next
LockResource
CreateFileA
GetLastError
GetTickCount64
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetThreadExecutionState
MultiByteToWideChar
WideCharToMultiByte
QueryPerformanceCounter
QueryPerformanceFrequency
VerSetConditionMask
FreeLibrary
GetModuleHandleExW
GetProcAddress
LoadLibraryA
FormatMessageW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
GetCurrentThreadId
CreateToolhelp32Snapshot
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
SetLastError
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
GetStdHandle
GetModuleFileNameW
GetFileType
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
CreateDirectoryW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
SetFilePointerEx
HeapSize
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
CreateFileW
WriteConsoleW
SetCurrentDirectoryA
FreeResource
FindResourceA
CreateMutexW
WriteFile
HeapFree
Process32First
SizeofResource
ExitProcess
GetSystemTimeAsFileTime
Sleep
user32
SetWindowPos
GetWindowPlacement
SetWindowPlacement
BringWindowToTop
SetFocus
GetKeyState
MapVirtualKeyW
SetCapture
ReleaseCapture
SetForegroundWindow
GetDC
ReleaseDC
SetPropW
GetPropW
RemovePropW
GetClientRect
AdjustWindowRectEx
SetCursorPos
SetCursor
GetCursorPos
ClientToScreen
ScreenToClient
WindowFromPoint
SetRect
OffsetRect
PtInRect
GetWindowLongW
SetWindowLongW
LoadCursorW
DestroyIcon
LoadImageW
SystemParametersInfoW
MonitorFromWindow
GetMonitorInfoW
GetRawInputData
RegisterRawInputDevices
GetRawInputDeviceInfoA
GetRawInputDeviceList
ChangeDisplaySettingsExW
EnumDisplaySettingsW
EnumDisplayDevicesW
EnumDisplayMonitors
RegisterDeviceNotificationW
UnregisterDeviceNotification
ToUnicode
RegisterClassExW
UnregisterClassW
DefWindowProcW
GetMessageTime
PeekMessageW
DispatchMessageW
TranslateMessage
TrackMouseEvent
MessageBoxA
ShowWindow
DestroyWindow
ClipCursor
CreateWindowExW
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
gdi32
SetDeviceGammaRamp
DeleteDC
DescribePixelFormat
CreateRectRgn
GetDeviceCaps
CreateDCW
DeleteObject
ChoosePixelFormat
SetPixelFormat
SwapBuffers
shell32
DragQueryFileW
DragQueryPoint
DragFinish
DragAcceptFiles
Sections
.text Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ