Static task
static1
Behavioral task
behavioral1
Sample
81c6edfcda51857b295de100b8f59c5343f64734817ca196ac4ea639949c72da.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
81c6edfcda51857b295de100b8f59c5343f64734817ca196ac4ea639949c72da.exe
Resource
win10v2004-20230915-en
General
-
Target
81c6edfcda51857b295de100b8f59c5343f64734817ca196ac4ea639949c72da
-
Size
2.9MB
-
MD5
e2be01af788e8132f6d3e6c21b0faf09
-
SHA1
f7238baeaec49c6e2faf2dc8809db778574530b5
-
SHA256
81c6edfcda51857b295de100b8f59c5343f64734817ca196ac4ea639949c72da
-
SHA512
da688372ec128f862a36c2246f40bbf31b0d9a1a5b6debb8e3f85ed39d8a1819b87c95066feecd073eb48f007351d717ea87dacaadbb8effa90b9825aa5fd2fe
-
SSDEEP
49152:TT6uK9w4K7etiHMt3N1r2CTMZlVMnsNxPXCh:Tgw4cetiHAd1rwETh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 81c6edfcda51857b295de100b8f59c5343f64734817ca196ac4ea639949c72da
Files
-
81c6edfcda51857b295de100b8f59c5343f64734817ca196ac4ea639949c72da.exe windows:5 windows x86
33275ab1f9df18fd61464333c335bc93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSizeEx
GetTickCount
GetStartupInfoW
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
HeapReAlloc
HeapSize
VirtualAlloc
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetProcessHeap
SetEnvironmentVariableA
SetErrorMode
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFlags
GetThreadLocale
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
InterlockedDecrement
GlobalFindAtomW
GetVersionExW
CompareStringW
GetVersionExA
GetModuleHandleA
WritePrivateProfileStringW
FreeResource
GetCurrentProcessId
GlobalAddAtomW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryW
CompareStringA
InterlockedExchange
lstrcmpW
FreeLibrary
GetModuleHandleW
GetLastError
SetLastError
FormatMessageW
MulDiv
VirtualProtect
LoadLibraryA
GetProcAddress
lstrcatA
GetSystemDirectoryW
GetDiskFreeSpaceExW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCommandLineW
LocalFree
CopyFileW
CreateFileW
GetFileSize
GetFileTime
WaitForSingleObject
CreateDirectoryW
GetFileAttributesW
DeleteFileW
IsBadReadPtr
GetSystemInfo
Sleep
ExitProcess
lstrlenW
CreateThread
CloseHandle
lstrcpyW
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetModuleFileNameW
lstrlenA
lstrcmpA
lstrcpyA
MultiByteToWideChar
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
QueryPerformanceCounter
FindResourceW
user32
PostThreadMessageW
SetForegroundWindow
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
CopyRect
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
CharUpperW
SetWindowsHookExW
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfA
SetCapture
RedrawWindow
ReleaseDC
GetDC
InflateRect
LoadCursorW
SetWindowLongW
SetCursor
ReleaseCapture
MessageBeep
GetSysColor
PeekMessageW
LoadImageW
PtInRect
SetWindowTextW
GetMessageW
TranslateMessage
DispatchMessageW
ScreenToClient
GetSysColorBrush
WindowFromPoint
LoadIconW
EnableWindow
InvalidateRect
GetClientRect
IsIconic
GetSystemMenu
AppendMenuW
DeleteMenu
DrawIcon
GetKeyState
IsWindow
PostMessageW
GetSystemMetrics
SendMessageW
RegisterClipboardFormatW
UnregisterClassW
GetWindowRect
GetParent
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableW
CharNextW
MessageBoxW
DestroyMenu
ShowWindow
MoveWindow
IsDialogMessageW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
SetMenu
IsWindowEnabled
MapWindowPoints
gdi32
SetTextColor
SetMapMode
GetClipBox
ExcludeClipRect
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreateSolidBrush
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
SetBkMode
RestoreDC
SetBkColor
SaveDC
CreateRectRgnIndirect
CreateBitmap
GetDeviceCaps
GetTextExtentPoint32W
CreateFontIndirectW
GetStockObject
GetObjectW
BitBlt
SelectObject
CreateCompatibleDC
ScaleViewportExtEx
CreateDIBSection
CreateCompatibleBitmap
comdlg32
GetSaveFileNameW
GetOpenFileNameW
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegCloseKey
GetUserNameW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueW
shell32
ShellExecuteExW
SHGetPathFromIDListW
SHBrowseForFolderW
CommandLineToArgvW
SHGetSpecialFolderPathW
ShellExecuteW
comctl32
ord17
shlwapi
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathIsUNCW
PathFileExistsW
oledlg
OleUIBusyW
ole32
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
OleFlushClipboard
CoRevokeClassObject
OleIsCurrentClipboard
CoRegisterMessageFilter
CLSIDFromProgID
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysStringLen
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 5.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 77B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ