Static task
static1
Behavioral task
behavioral1
Sample
4c6d763139ec3a1934c5c3fa889024abbd77083bf641d0c12a7816e3b26108ca.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4c6d763139ec3a1934c5c3fa889024abbd77083bf641d0c12a7816e3b26108ca.exe
Resource
win10v2004-20230915-en
General
-
Target
4c6d763139ec3a1934c5c3fa889024abbd77083bf641d0c12a7816e3b26108ca
-
Size
3.1MB
-
MD5
8f37c7b0a45b4b0280f9510d9c4b4c01
-
SHA1
0f896adce52c00e8620b5e0d6bd283679b21dd32
-
SHA256
4c6d763139ec3a1934c5c3fa889024abbd77083bf641d0c12a7816e3b26108ca
-
SHA512
c38919ef3b8d0827fc40b06a2d41284a2451cf9705e44c65838f872202d09eb5201b0514dffbed993e0ca7feb16590775ded2945274c01b9b9cf7c5e3e4bae8a
-
SSDEEP
49152:Tfv/XRm3fUHv648igad1UUi9Gi2G+KXY9T53/A1Ac3Wad:TH/b6YgafUT2GhoP/jO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c6d763139ec3a1934c5c3fa889024abbd77083bf641d0c12a7816e3b26108ca
Files
-
4c6d763139ec3a1934c5c3fa889024abbd77083bf641d0c12a7816e3b26108ca.exe windows:5 windows x86
db1543583aeaf9b3832816ff469b7ca4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipDrawImageRectI
GdipSetInterpolationMode
GdipDeleteGraphics
GdipGetImageWidth
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipGetImageGraphicsContext
GdipAlloc
GdipDisposeImage
GdipCreateBitmapFromScan0
GdipBitmapSetPixel
GdipSaveImageToFile
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCloneImage
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromHBITMAP
GdipFree
GdiplusShutdown
GdipGetImageHeight
GdipImageGetFrameDimensionsList
GdipImageSelectActiveFrame
GdipImageGetFrameDimensionsCount
GdiplusStartup
GdipImageGetFrameCount
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipCreateFromHDC
GdipDrawImageI
GdipLoadImageFromFileICM
GdipLoadImageFromFile
kernel32
SetFilePointer
WriteFile
FlushFileBuffers
LocalFree
GetCommandLineW
InterlockedExchangeAdd
FreeResource
GetVersionExA
SetLastError
CompareStringW
FreeLibrary
LoadLibraryW
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
FormatMessageW
GetCurrentProcessId
InterlockedExchange
CompareStringA
GetLocaleInfoW
EnumResourceLanguagesW
ConvertDefaultLocale
GetTickCount
GetThreadLocale
FindClose
FindNextFileW
FindFirstFileW
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
WriteConsoleW
InitializeCriticalSection
TlsSetValue
LocalReAlloc
DeleteCriticalSection
WritePrivateProfileStringW
LockFile
UnlockFile
SetEndOfFile
GetVolumeInformationW
GetFullPathNameW
SetErrorMode
GetFileSizeEx
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
RaiseException
GetSystemTimeAsFileTime
HeapFree
HeapReAlloc
ExitProcess
HeapSize
VirtualQuery
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
SetStdHandle
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
GetCurrentDirectoryA
GetDriveTypeA
GetProcessHeap
CreateFileA
SetEnvironmentVariableA
GetStdHandle
AllocConsole
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
TerminateProcess
Process32NextW
VirtualProtectEx
VirtualQueryEx
SetCurrentDirectoryW
DeleteFileW
CopyFileW
ExpandEnvironmentStringsW
GetCurrentDirectoryW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
CreatePipe
GetStartupInfoW
CreateProcessW
WaitForSingleObject
ReadFile
Beep
IsBadWritePtr
GetFileSize
GetFileTime
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
GetSystemInfo
VirtualAlloc
VirtualFree
GetModuleHandleA
lstrcatA
lstrcmpA
GetModuleHandleW
GetFileAttributesW
MulDiv
DuplicateHandle
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleFileNameW
lstrcpyW
LoadLibraryA
GetProcAddress
GetSystemDirectoryW
GetDiskFreeSpaceExW
GetCurrentThreadId
lstrcpynW
lstrlenA
lstrlenW
lstrcmpiW
LoadResource
LockResource
SizeofResource
FindResourceW
MultiByteToWideChar
GetVersionExW
TlsAlloc
TlsFree
GetModuleFileNameA
CreateFileW
SetFileTime
lstrcmpW
VirtualProtect
FlushInstructionCache
FreeConsole
GetCurrentThread
SetThreadPriority
Sleep
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCurrentProcess
GetLastError
TerminateThread
CreateThread
SuspendThread
ResumeThread
CloseHandle
GetLocaleInfoA
GlobalHandle
user32
SetPropW
GetClassLongW
CallNextHookEx
SetWindowsHookExW
GetCapture
IsChild
WinHelpW
SendDlgItemMessageA
SendDlgItemMessageW
RegisterWindowMessageW
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuW
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
MoveWindow
PostQuitMessage
ValidateRect
MapDialogRect
SetWindowContextHelpId
DestroyMenu
GetSysColorBrush
SetCapture
ReleaseCapture
CharUpperW
CharNextW
CopyAcceleratorTableW
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
UnregisterClassW
PostThreadMessageW
GetMenuItemID
GetMenuItemCount
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CallWindowProcW
GetMenu
OffsetRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetSubMenu
CreateDialogIndirectParamW
EndDialog
GrayStringW
DrawTextExW
TabbedTextOutW
CopyRect
DrawTextW
EndPaint
BeginPaint
GetCursorInfo
ClientToScreen
SetMenu
GetPropW
CreateMenu
GetComboBoxInfo
LockWindowUpdate
SetWindowTextW
FlashWindowEx
ShowCaret
HideCaret
GetFocus
EnumChildWindows
SetWindowLongW
GetNextDlgTabItem
SetFocus
CreateWindowExW
GetSysColor
CreateAcceleratorTableW
IsWindowEnabled
RedrawWindow
GetActiveWindow
SetActiveWindow
DestroyAcceleratorTable
GetWindowLongW
TranslateAcceleratorW
IsDialogMessageW
DefWindowProcW
RegisterClassExW
GetDlgItem
GetWindowDC
WindowFromPoint
GetCursor
GetIconInfo
DrawIconEx
PrintWindow
VkKeyScanW
MessageBoxW
SetCursor
LoadCursorW
GetDlgCtrlID
GetDesktopWindow
IsRectEmpty
IntersectRect
InvalidateRect
MessageBoxA
GetKeyState
wsprintfW
ChildWindowFromPoint
GetWindowTextLengthW
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
ShowWindow
SetWindowPos
GetParent
ScreenToClient
IsClipboardFormatAvailable
DestroyWindow
IsIconic
DrawIcon
GetSystemMenu
AppendMenuW
PostMessageW
RegisterClipboardFormatW
GetKeyNameTextW
PeekMessageW
SystemParametersInfoW
LoadIconW
EqualRect
SetRect
mouse_event
EmptyClipboard
SetClipboardData
GetWindowTextW
IsWindowVisible
GetClassNameW
EnumWindows
MapVirtualKeyW
keybd_event
OpenClipboard
GetClipboardData
CloseClipboard
GetDC
ReleaseDC
IsWindow
SetForegroundWindow
KillTimer
ExitWindowsEx
GetSystemMetrics
EnableWindow
GetMessageW
TranslateMessage
DispatchMessageW
SetClipboardViewer
RemovePropW
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ChangeClipboardChain
GetWindowRect
CreatePopupMenu
UpdateWindow
PtInRect
GetCursorPos
SetCursorPos
UnregisterHotKey
RegisterHotKey
SetTimer
SendMessageW
GetClientRect
GetAsyncKeyState
gdi32
GetCurrentObject
DeleteObject
Ellipse
CreateFontW
CreatePen
CreateSolidBrush
CreateHatchBrush
GetBkColor
GetTextColor
SetBkColor
SetBkMode
SetTextColor
RestoreDC
SetMapMode
LineTo
MoveToEx
GetMapMode
GetBitmapBits
CreateCompatibleDC
GetViewportExtEx
GetWindowExtEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetRgnBox
SetBitmapBits
CreateRectRgnIndirect
CreateBitmap
GetClipBox
CreateCompatibleBitmap
BitBlt
SelectObject
DPtoLP
CreateFontIndirectW
GetTextMetricsW
GetTextExtentPoint32W
CreatePalette
CreateDIBitmap
CreateDCW
GetDeviceCaps
DeleteDC
GetObjectW
GetStockObject
SaveDC
SelectPalette
RealizePalette
GetDIBits
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegDeleteValueW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegCreateKeyExW
AdjustTokenPrivileges
RegSetValueExW
RegOpenKeyExW
RegCloseKey
GetUserNameW
RegQueryValueExW
LookupPrivilegeValueW
OpenProcessToken
LookupPrivilegeValueA
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
ShellExecuteExW
CommandLineToArgvW
SHGetSpecialFolderPathW
comctl32
_TrackMouseEvent
shlwapi
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathStripToRootW
PathFileExistsW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoGetClassObject
CoTaskMemFree
CoTaskMemAlloc
OleRun
CoInitialize
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CreateStreamOnHGlobal
CoInitializeEx
CoUninitialize
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
oleaut32
VariantClear
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
SysFreeString
VariantChangeType
VariantCopy
SysAllocString
VariantInit
SafeArrayDestroy
OleCreateFontIndirect
GetErrorInfo
winmm
PlaySoundW
iphlpapi
GetAdaptersInfo
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
winhttp
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpConnect
WinHttpOpen
WinHttpCloseHandle
WinHttpReadData
WinHttpQueryHeaders
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 361KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ