Static task
static1
Behavioral task
behavioral1
Sample
97a4ac0aa88dba03a2f53642c4dd2777887f394cb0fbaf74a0de7f57a56ede6c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
97a4ac0aa88dba03a2f53642c4dd2777887f394cb0fbaf74a0de7f57a56ede6c.exe
Resource
win10v2004-20230915-en
General
-
Target
97a4ac0aa88dba03a2f53642c4dd2777887f394cb0fbaf74a0de7f57a56ede6c
-
Size
580KB
-
MD5
93e3f256aff22bb44f0b26d9f2862be1
-
SHA1
a7478aef325115d8b7476e87881ee4d85b7cbbee
-
SHA256
97a4ac0aa88dba03a2f53642c4dd2777887f394cb0fbaf74a0de7f57a56ede6c
-
SHA512
011952ef6f26268fb123ffc21283deb9b46588dd0cf00b9d2a70c4a4832e5839a44e4c21fb413aa9b9d12604ac8ce553db497837d44b4e89414f8049e547a044
-
SSDEEP
6144:wDpb3Tu03NmM5dPo4OEsC0NfTUnveSPYWfYSY37md2QRrJDUKrt:qu03NmM5po4OEsC0NfT+veS5fY/LYrt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97a4ac0aa88dba03a2f53642c4dd2777887f394cb0fbaf74a0de7f57a56ede6c
Files
-
97a4ac0aa88dba03a2f53642c4dd2777887f394cb0fbaf74a0de7f57a56ede6c.exe windows:5 windows x64
279141405971b706f6691df9d7e5ecb8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
AllocateAndInitializeSid
CopySid
EqualSid
FreeSid
GetLengthSid
GetTokenInformation
LookupAccountSidW
OpenProcessToken
GetSecurityInfo
AdjustTokenPrivileges
LookupPrivilegeValueW
GetUserNameW
RegCreateKeyExW
RegSetValueExW
user32
LoadIconW
LoadStringW
CheckDlgButton
EnableWindow
EndDialog
GetDlgItem
IsDlgButtonChecked
MessageBoxW
GetWindowThreadProcessId
CascadeWindows
CheckMenuRadioItem
DestroyMenu
EnableMenuItem
EndTask
EnumDisplaySettingsW
EnumWindows
GetClassLongPtrW
GetClientRect
GetCursorPos
GetKeyState
GetMenu
GetMessageW
LoadBitmapW
DestroyIcon
CreateIconIndirect
TranslateMessage
TrackPopupMenuEx
ShowWindow
SetTimer
SetForegroundWindow
SetFocus
PostMessageW
PeekMessageW
OpenIcon
MoveWindow
ModifyMenuW
KillTimer
IsZoomed
InsertMenuW
GetWindowPlacement
GetMenuStringW
GetMenuItemCount
FindWindowW
DrawMenuBar
DispatchMessageW
DeleteMenu
DefWindowProcW
CreatePopupMenu
CreateDialogParamW
BringWindowToTop
AppendMenuW
LockWorkStation
ExitWindowsEx
RemoveMenu
CharUpperW
GetGuiResources
GetMenuState
CheckMenuItem
ReleaseDC
GetSystemMetrics
GetDC
FillRect
InflateRect
EndPaint
DrawTextW
CallWindowProcW
BeginPaint
wsprintfW
TrackPopupMenu
TileWindows
SwitchToThisWindow
ShowWindowAsync
SetWindowTextW
SetWindowPos
SetWindowLongPtrW
SetMenuDefaultItem
SendMessageW
SendMessageTimeoutW
PostThreadMessageW
MapWindowPoints
LoadMenuW
IsWindowVisible
IsWindow
InvalidateRect
GetWindowTextW
GetWindowRect
GetWindow
GetWindowLongPtrW
GetSubMenu
DialogBoxParamW
GetParent
gdi32
ExtTextOutW
SaveDC
RestoreDC
ExcludeClipRect
SetBkColor
MoveToEx
LineTo
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
SetTextColor
SelectObject
GetStockObject
shell32
ShellExecuteW
ShellExecuteExW
Shell_NotifyIconW
ShellAboutW
shlwapi
StrFormatByteSizeW
comctl32
CreateStatusWindowW
InitCommonControls
ImageList_Remove
ImageList_ReplaceIcon
ImageList_Create
msvcrt
wcslen
wcscpy
wcscmp
wcsncpy
__lconv_init
signal
_wcsicmp
_wcmdln
__winitenv
_initterm
_fpreset
_cexit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__setusermatherr
malloc
wcschr
_snwprintf
_wcsnicmp
wcsstr
_vsnwprintf
_ultow
memset
memcpy
labs
kernel32
CloseHandle
GetProcessAffinityMask
OpenProcess
SetProcessAffinityMask
TlsGetValue
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
Sleep
SetUnhandledExceptionFilter
GetStartupInfoW
WaitForSingleObject
SetProcessShutdownParameters
lstrlenW
LoadLibraryA
GetExitCodeThread
GetCurrentProcessId
FormatMessageW
CreateMutexW
GetLastError
GetCurrentProcess
LoadLibraryW
FreeLibrary
GetNumberFormatW
GetLocaleInfoW
QueryDosDeviceW
GetSystemInfo
GetSystemDirectoryW
GetPriorityClass
GetExitCodeProcess
SetPriorityClass
ReadProcessMemory
LocalFree
LeaveCriticalSection
InitializeCriticalSection
GetProcessIoCounters
EnterCriticalSection
DeleteCriticalSection
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
TerminateProcess
CreateProcessW
CreateEventW
CreateThread
HeapAlloc
GetProcessHeap
GetProcAddress
GetModuleHandleW
HeapFree
ntdll
NtQueryInformationProcess
NtQuerySystemInformation
NtShutdownSystem
NtSetSystemPowerState
RtlNtStatusToDosError
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 496KB - Virtual size: 496KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ