Static task
static1
Behavioral task
behavioral1
Sample
872850d538a1cd163e9a92bf2e8eb402acb9305fa5c05a850d36af3ee4c2ac02.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
872850d538a1cd163e9a92bf2e8eb402acb9305fa5c05a850d36af3ee4c2ac02.exe
Resource
win10v2004-20230915-en
General
-
Target
872850d538a1cd163e9a92bf2e8eb402acb9305fa5c05a850d36af3ee4c2ac02
-
Size
676KB
-
MD5
55cb04f12e24a8f49c139c6ca0715fa3
-
SHA1
8074a08ef60cbec77a4e36efe6a9b7909c9b573c
-
SHA256
872850d538a1cd163e9a92bf2e8eb402acb9305fa5c05a850d36af3ee4c2ac02
-
SHA512
f59f514d20ade8ce347fdd43172db2a883079baf21b5bf8b4dfe693dd7a7e81271ccd227a727094aa2e789aa9054a8e0c5a864507892e53dc6b1ab524f692ee3
-
SSDEEP
12288:sX6HgZPWPm0WxI3SQBNSmWOwbQ4GxhHKtT4GK7I9Hc:sK+WPm3O8mKbQ4RtTDK09Hc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 872850d538a1cd163e9a92bf2e8eb402acb9305fa5c05a850d36af3ee4c2ac02
Files
-
872850d538a1cd163e9a92bf2e8eb402acb9305fa5c05a850d36af3ee4c2ac02.exe windows:4 windows x86
59cc2aaada14c6fb297921158f70171a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GlobalFlags
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
SetErrorMode
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
ExitThread
SetStdHandle
GetFileType
HeapSize
GetACP
IsValidCodePage
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetFullPathNameA
DuplicateHandle
GetFileSize
UnlockFile
LockFile
FlushFileBuffers
FindNextFileA
GetModuleFileNameW
SuspendThread
ResumeThread
SetThreadPriority
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
FindActCtxSectionStringA
LoadLibraryExA
lstrcmpA
FileTimeToLocalFileTime
GetThreadLocale
GlobalAlloc
MulDiv
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
SetLastError
lstrcmpW
GetVersionExA
GetNativeSystemInfo
LCMapStringA
GetFileTime
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
CreateDirectoryA
GetModuleHandleA
GetProcAddress
GetVolumeInformationA
FileTimeToSystemTime
TerminateProcess
GetCurrentProcessId
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
PeekNamedPipe
CreatePipe
CreateProcessA
Sleep
FormatMessageA
HeapAlloc
WaitForSingleObject
CreateEventA
GetProcessHeap
LeaveCriticalSection
HeapFree
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetEvent
GetPrivateProfileStringA
GetModuleFileNameA
GetTickCount
LocalAlloc
GetSystemWindowsDirectoryA
InterlockedDecrement
InterlockedIncrement
LocalFree
CloseHandle
WriteFile
SetFilePointer
CreateFileA
FindClose
FindFirstFileA
ReadFile
SetEndOfFile
InterlockedExchange
CompareStringA
GetVersion
MultiByteToWideChar
lstrlenA
GetLastError
CompareStringW
GetDriveTypeA
FindResourceA
LoadResource
LockResource
SizeofResource
CreateThread
WideCharToMultiByte
user32
RegisterClipboardFormatA
UnregisterClassA
MessageBeep
GetNextDlgGroupItem
ReleaseCapture
SetCapture
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
DestroyMenu
LoadCursorA
GetSysColorBrush
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
SetCursor
CharNextA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
MoveWindow
SetWindowTextA
IsDialogMessageA
GetWindowThreadProcessId
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
GetNextDlgTabItem
EnableWindow
SendMessageA
EndDialog
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
PostThreadMessageA
CharUpperA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetWindowRect
ShowWindow
LoadIconA
IsWindowVisible
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
GetParent
GetFocus
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
InvalidateRect
GetWindow
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
SetWindowPos
SetWindowLongA
GetWindowLongA
CallWindowProcA
DefWindowProcA
GetDlgCtrlID
PtInRect
SetForegroundWindow
UpdateWindow
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
CopyRect
gdi32
GetRgnBox
GetMapMode
GetTextColor
GetBkColor
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateRectRgnIndirect
CreateFontA
CreateBitmap
GetClipBox
SetTextColor
ScaleWindowExtEx
GetDeviceCaps
SetBkColor
GetObjectA
SetWindowExtEx
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegCloseKey
RegGetValueA
RegOpenKeyExA
LookupAccountNameA
CreateWellKnownSid
ConvertSidToStringSidA
LookupAccountSidA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
oledlg
ord8
ole32
CoTaskMemAlloc
CoCreateInstance
CoInitialize
CoTaskMemFree
CLSIDFromProgID
CLSIDFromString
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
OleRun
CoGetClassObject
oleaut32
SafeArrayUnaccessData
SysAllocString
SysAllocStringLen
VariantChangeType
VariantCopy
SysStringLen
OleCreateFontIndirect
SafeArrayAccessData
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayGetUBound
SafeArrayGetLBound
VariantClear
SysAllocStringByteLen
SysFreeString
SysStringByteLen
VariantInit
SafeArrayDestroy
SafeArrayPutElement
GetErrorInfo
SafeArrayCreateVector
ws2_32
WSACleanup
WSASetLastError
WSAStartup
netapi32
NetLocalGroupGetMembers
NetUserSetInfo
NetUserAdd
NetUserGetInfo
NetApiBufferFree
NetQueryDisplayInformation
NetUserDel
activeds
ord5
ord6
ord4
ord3
Sections
.text Size: 480KB - Virtual size: 478KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 925KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ