Static task
static1
Behavioral task
behavioral1
Sample
c18b87a6aece78bbe2ac8a48248a03cb0d1834e1c76817e41e1b73e57d80fe1b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c18b87a6aece78bbe2ac8a48248a03cb0d1834e1c76817e41e1b73e57d80fe1b.exe
Resource
win10v2004-20230915-en
General
-
Target
c18b87a6aece78bbe2ac8a48248a03cb0d1834e1c76817e41e1b73e57d80fe1b
-
Size
320KB
-
MD5
605a50b62ac63f0143e4b77cc35d3049
-
SHA1
4292a9c5e3a5be6969d6c66cf45d3538c50cbdb2
-
SHA256
c18b87a6aece78bbe2ac8a48248a03cb0d1834e1c76817e41e1b73e57d80fe1b
-
SHA512
b50d1c0ba903381e1229854059c769bb000c9e6ec01b50a8b6b495c40ad741b4c7a06e090b6628bd63f558ae81fc2988ee85513da3094c7cd239393260808fbf
-
SSDEEP
6144:lwpSUmmS7t5IFxA45kPIY6nNQW6/R6b52PTBUYj7f8mk1QvZ4Q6aYArYF:qmExAiNQl+0PT2Yjrv6H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c18b87a6aece78bbe2ac8a48248a03cb0d1834e1c76817e41e1b73e57d80fe1b
Files
-
c18b87a6aece78bbe2ac8a48248a03cb0d1834e1c76817e41e1b73e57d80fe1b.exe windows:4 windows x86
d89c314af25abc80b7ccfb34fd5efce7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
GlobalAddAtomA
lstrcmpW
GlobalFindAtomA
GetCPInfo
GetOEMCP
VirtualAlloc
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcessHeap
RtlUnwind
RaiseException
ExitProcess
SetStdHandle
GetFileType
TlsFree
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetModuleFileNameW
GlobalGetAtomNameA
FindNextFileA
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
GetFullPathNameA
DuplicateHandle
GetFileSize
UnlockFile
LockFile
FlushFileBuffers
LoadLibraryA
GetThreadLocale
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
FindActCtxSectionStringA
LoadLibraryExA
lstrcmpA
FreeLibrary
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
GetVersionExA
LCMapStringA
FileTimeToSystemTime
GetDriveTypeA
CreateDirectoryA
GetProcAddress
GetVolumeInformationA
TerminateProcess
OpenProcess
GetCurrentProcessId
Process32Next
Process32First
CreateToolhelp32Snapshot
WaitForSingleObject
Sleep
GetCurrentProcess
CreateProcessA
MoveFileA
GetPrivateProfileStringA
GetModuleHandleA
GetCommandLineA
GetModuleFileNameA
GetTickCount
LocalFree
LocalAlloc
GetSystemWindowsDirectoryA
InterlockedDecrement
InterlockedIncrement
FindResourceA
LoadResource
LockResource
SizeofResource
FindClose
FindFirstFileA
ReadFile
SetEndOfFile
CloseHandle
WriteFile
SetFilePointer
CreateFileA
InterlockedExchange
CompareStringA
GetLastError
MultiByteToWideChar
CompareStringW
GetVersion
WideCharToMultiByte
lstrlenA
user32
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
CharUpperA
ShowWindow
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
ClientToScreen
UnregisterClassA
DestroyMenu
SendMessageTimeoutW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
PostMessageA
MessageBoxA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
UnhookWindowsHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextA
GetSystemMetrics
GetWindowThreadProcessId
SendMessageA
gdi32
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
DeleteObject
DeleteDC
RectVisible
PtVisible
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueA
RegEnumKeyA
RegQueryValueExA
QueryServiceStatus
OpenServiceA
RegOpenKeyA
CloseServiceHandle
OpenSCManagerA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyExA
RegCloseKey
CreateWellKnownSid
AdjustTokenPrivileges
ConvertSidToStringSidA
LookupAccountSidA
LookupAccountNameA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
shlwapi
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
ole32
CoInitializeEx
oleaut32
SafeArrayPutElement
SafeArrayDestroy
VariantInit
SysFreeString
VariantChangeType
SafeArrayCreateVector
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
VariantClear
netapi32
NetLocalGroupGetMembers
NetApiBufferFree
activeds
ord6
ord4
ord3
ord5
Sections
.text Size: 192KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ