Static task
static1
Behavioral task
behavioral1
Sample
ed02b173a16a5fb0f3e1fb748884a1069a8b4fe908f00d731b1677ab5b354e22.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ed02b173a16a5fb0f3e1fb748884a1069a8b4fe908f00d731b1677ab5b354e22.exe
Resource
win10v2004-20230915-en
General
-
Target
ed02b173a16a5fb0f3e1fb748884a1069a8b4fe908f00d731b1677ab5b354e22
-
Size
372KB
-
MD5
05a21c35d261c3b38da8a0406b61adbf
-
SHA1
0a451ba35f59719da48634d6877dbc8b9a3ca4b2
-
SHA256
ed02b173a16a5fb0f3e1fb748884a1069a8b4fe908f00d731b1677ab5b354e22
-
SHA512
edfaa03aa543f78104d19f0f1993a2c9eefc302cb988a6510c4c6b015f96b31d7131899ccdfa62270420d4144b54787e79cd50fbddd23c0b03c6afed17637feb
-
SSDEEP
6144:7y2kDwy1VUcGMfxh4RFrC+bx4BJuny8W5mfZ7RXfU9f4WUPYHzKQwt8EPD:7ybky1a0xhUC+ban8WbUPYTKKEPD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ed02b173a16a5fb0f3e1fb748884a1069a8b4fe908f00d731b1677ab5b354e22
Files
-
ed02b173a16a5fb0f3e1fb748884a1069a8b4fe908f00d731b1677ab5b354e22.exe windows:4 windows x86
e88448cf8fa2415b8a6c808229be4bd4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
MoveFileA
DeleteFileA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
EnterCriticalSection
GetVolumeInformationA
CreateFileA
GetShortPathNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
SetErrorMode
RtlUnwind
ExitProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapAlloc
HeapFree
GetTimeFormatA
GetDateFormatA
GetStartupInfoA
GetCommandLineA
TerminateProcess
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
SetUnhandledExceptionFilter
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
GlobalFlags
LocalAlloc
LocalLock
LocalUnlock
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
InterlockedDecrement
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
InterlockedIncrement
CloseHandle
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
SetLastError
GlobalFree
MulDiv
GlobalAlloc
FormatMessageA
LocalFree
FreeResource
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
GetModuleHandleA
GetProcAddress
lstrcpynA
GlobalLock
GlobalUnlock
GlobalGetAtomNameA
GlobalAddAtomA
FindResourceA
LoadResource
LockResource
SizeofResource
GetCurrentThreadId
GetLocalTime
GetModuleFileNameA
GetTickCount
RaiseException
DeleteCriticalSection
InitializeCriticalSection
GetLastError
lstrlenA
lstrcmpiA
GetStringTypeExA
WideCharToMultiByte
lstrlenW
CompareStringA
CompareStringW
MultiByteToWideChar
GetVersion
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
FindFirstFileA
GetVersionExA
user32
GetSysColorBrush
FillRect
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetWindowDC
BeginPaint
EndPaint
InflateRect
GetMenuItemInfoA
IsRectEmpty
SetTimer
KillTimer
DeleteMenu
DestroyIcon
CharNextA
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
PostThreadMessageA
GetDCEx
LockWindowUpdate
SetParent
EndDialog
GetMenuStringA
InsertMenuA
GetDC
ReleaseDC
IsZoomed
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetTabbedTextExtentA
MapWindowPoints
MessageBoxA
TrackPopupMenu
SetForegroundWindow
GetClientRect
AdjustWindowRectEx
DeferWindowPos
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSystemMetrics
PtInRect
RegisterWindowMessageA
wsprintfA
LoadMenuA
DestroyMenu
GetClassNameA
GetSysColor
SetWindowPos
WinHelpA
SetFocus
EqualRect
GetDlgItem
SetWindowLongA
GetKeyState
GetDlgCtrlID
GetMenu
UnpackDDElParam
ReuseDDElParam
LoadIconA
GetClassInfoA
LoadAcceleratorsA
SetActiveWindow
IsWindowVisible
InvalidateRect
CharUpperA
UpdateWindow
EnableWindow
UnregisterClassA
PostQuitMessage
SendMessageA
SetRect
MessageBeep
IsClipboardFormatAvailable
RegisterClipboardFormatA
IsIconic
InsertMenuItemA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
IntersectRect
OffsetRect
SetRectEmpty
CopyRect
BringWindowToTop
SetMenu
ShowWindow
IsWindow
GetWindow
SetWindowContextHelpId
MapDialogRect
ValidateRect
ShowOwnedPopups
CreateDialogIndirectParamA
GetMessagePos
GetNextDlgTabItem
GetParent
GetWindowLongA
ClientToScreen
ScreenToClient
PostMessageA
GetActiveWindow
SetCapture
WindowFromPoint
GetLastActivePopup
GetFocus
GetCapture
LoadCursorA
SetCursor
ReleaseCapture
GetDesktopWindow
GetWindowThreadProcessId
GetCursorPos
TranslateMessage
DispatchMessageA
GetMessageA
PeekMessageA
WaitMessage
TranslateAcceleratorA
IsWindowEnabled
GetMessageTime
comctl32
ImageList_Destroy
ImageList_GetImageInfo
ImageList_Draw
ord17
shlwapi
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
msxfs
WFSOpen
WFSStartUp
WFSFreeResult
WFSExecute
WFSClose
gdi32
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
SelectObject
GetTextMetricsA
GetTextExtentPoint32A
CreateCompatibleDC
CreatePatternBrush
ExtSelectClipRgn
DeleteDC
StretchDIBits
DeleteObject
GetCharWidthA
CreateFontA
GetDeviceCaps
CreateDCA
DPtoLP
CreateFontIndirectA
GetStockObject
SaveDC
RestoreDC
SetBkMode
CreateSolidBrush
CreateRectRgnIndirect
PatBlt
SetRectRgn
CombineRgn
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
StartPage
EndPage
SetAbortProc
AbortDoc
EndDoc
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
CreateCompatibleBitmap
StartDocA
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
IntersectClipRect
ExcludeClipRect
SetMapMode
PtVisible
winspool.drv
GetJobA
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comdlg32
GetFileTitleA
FindTextA
GetSaveFileNameA
GetOpenFileNameA
PrintDlgA
CommDlgExtendedError
ReplaceTextA
advapi32
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegCreateKeyA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegSetValueA
RegCloseKey
shell32
SHGetFileInfoA
ExtractIconA
DragQueryFileA
DragFinish
ole32
OleUninitialize
CLSIDFromString
CLSIDFromProgID
StringFromGUID2
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemAlloc
CoFreeUnusedLibraries
StringFromCLSID
CoRegisterMessageFilter
CoTaskMemFree
OleInitialize
CoDisconnectObject
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleFlushClipboard
OleIsCurrentClipboard
oleaut32
RegisterTypeLi
LoadTypeLi
LoadRegTypeLi
VariantCopy
SysAllocString
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
SystemTimeToVariantTime
SafeArrayDestroy
SysStringByteLen
SysFreeString
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 248KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE