Static task
static1
Behavioral task
behavioral1
Sample
72be759cb785e7034485e7cbb8403927206a40d8cb60ad1ced4418f824fc1771.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
72be759cb785e7034485e7cbb8403927206a40d8cb60ad1ced4418f824fc1771.exe
Resource
win10v2004-20230915-en
General
-
Target
72be759cb785e7034485e7cbb8403927206a40d8cb60ad1ced4418f824fc1771
-
Size
15.2MB
-
MD5
55480d006a207243bc5acaf5c8339d91
-
SHA1
5082a76a9a6adfe329c7e3656cf12ac36006ce7a
-
SHA256
72be759cb785e7034485e7cbb8403927206a40d8cb60ad1ced4418f824fc1771
-
SHA512
cef429125c1fe2e4386cc197929a9c8054360c52f7bfe22f8b4033666b9cffda586c322e691ca99a91410cd6d5e4ca8d37c4fc7ce4b68dd6a673854b489f1237
-
SSDEEP
393216:VFaoNfFmPLl7MxT+KldLrOLbUhlYWRxxCEWnkpOwao8aB/I1bx:vagFyJGbldLrOEfYcxxCxkpOt6Bw1bx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72be759cb785e7034485e7cbb8403927206a40d8cb60ad1ced4418f824fc1771
Files
-
72be759cb785e7034485e7cbb8403927206a40d8cb60ad1ced4418f824fc1771.exe windows:5 windows x86
d2e13bcf0396e95bd7e37d3c33b57526
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceW
WriteFile
SizeofResource
LoadResource
LockResource
SetCurrentDirectoryW
MulDiv
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentDirectoryW
FreeLibraryAndExitThread
ExitThread
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
ExpandEnvironmentStringsW
PeekNamedPipe
WaitForMultipleObjects
GetSystemDirectoryA
GetTempPathW
ResetEvent
SetEvent
lstrlenA
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
GetFileSizeEx
GetFileInformationByHandle
InterlockedCompareExchange
CreateEventW
GetModuleHandleW
GetLastError
GetCurrentProcessId
LocalFree
LocalAlloc
WideCharToMultiByte
OutputDebugStringA
Sleep
InterlockedDecrement
InterlockedIncrement
DeleteFileW
GlobalAlloc
GlobalLock
GlobalUnlock
SleepEx
MultiByteToWideChar
IsProcessorFeaturePresent
CreateFileW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GlobalFree
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
DecodePointer
HeapDestroy
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetSystemInfo
FormatMessageW
GetVersionExW
GetPrivateProfileStringW
FindClose
CreateDirectoryW
FindFirstFileW
FindNextFileW
MoveFileExW
FileTimeToSystemTime
ReleaseMutex
CreateMutexW
GetTickCount
AreFileApisANSI
FlushInstructionCache
HeapCreate
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FreeResource
GetFullPathNameW
GetLocalTime
GetVersionExA
GetSystemTime
GetModuleHandleA
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetStringTypeW
CompareStringW
LCMapStringW
GetFileType
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
OutputDebugStringW
WaitForSingleObjectEx
SetStdHandle
GetConsoleCP
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetEndOfFile
WritePrivateProfileStringW
GetModuleFileNameW
ReadFile
GetFileSize
CreateThread
QueryDosDeviceW
GetWindowsDirectoryW
LoadLibraryW
GetLogicalDriveStringsW
lstrcmpiW
CloseHandle
OpenProcess
LoadLibraryA
lstrlenW
SetLastError
GetProcessHeap
HeapFree
HeapAlloc
VirtualFree
VirtualAlloc
GetProcAddress
IsDebuggerPresent
FreeLibrary
user32
GetClassNameW
DestroyIcon
LoadBitmapW
CreateIconFromResource
LoadImageW
CharNextW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
ClientToScreen
SetRect
EnableMenuItem
GetSysColor
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
GetSystemMetrics
IsWindowVisible
DrawTextW
SystemParametersInfoA
CharLowerBuffW
MapVirtualKeyA
UpdateLayeredWindow
IsMenu
IsWindowEnabled
CreatePopupMenu
DestroyMenu
GetMenuItemCount
AppendMenuW
TrackPopupMenu
GetMenuInfo
SetMenuInfo
GetMenuItemInfoW
SetMenuContextHelpId
SetWindowLongW
ScreenToClient
GetWindowRect
GetClientRect
GetActiveWindow
GetDlgItem
CreateWindowExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
GetWindowLongW
GetFocus
SetFocus
PtInRect
EqualRect
IsRectEmpty
UnionRect
CopyRect
SetCursor
KillTimer
SetTimer
DestroyWindow
DestroyCursor
LoadCursorW
IntersectRect
LoadStringW
GetKeyState
UnregisterClassW
GetIconInfo
DrawIconEx
OffsetRect
InflateRect
ReleaseDC
GetDC
SendMessageW
ShowWindow
SetWindowPos
SetWindowTextW
IsWindow
SetForegroundWindow
GetCursorPos
InvalidateRect
EndPaint
BeginPaint
FindWindowW
UpdateWindow
ReleaseCapture
SetCapture
GetCapture
IsZoomed
IsIconic
SetLayeredWindowAttributes
AnimateWindow
PostQuitMessage
TrackMouseEvent
PostMessageW
GetMonitorInfoW
MonitorFromWindow
GetWindow
MapWindowPoints
SystemParametersInfoW
GetParent
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
ImpersonateLoggedOnUser
RevertToSelf
DuplicateTokenEx
CreateProcessAsUserW
OpenProcessToken
LookupAccountSidW
GetTokenInformation
SetTokenInformation
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
SHGetPathFromIDListW
SHGetFolderPathW
SHGetSpecialFolderPathW
SHBrowseForFolderW
ShellExecuteW
ole32
OleLockRunning
CoCreateGuid
CLSIDFromString
CLSIDFromProgID
CreateBindCtx
OleInitialize
OleUninitialize
CreateStreamOnHGlobal
CoCreateInstance
shlwapi
PathFileExistsW
StrToIntExW
psapi
EnumProcessModules
GetModuleFileNameExW
EnumProcesses
GetProcessImageFileNameW
crypt32
CryptMsgClose
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
CryptMsgGetParam
gdiplus
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
GdipGetImageHeight
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipDeleteGraphics
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipDrawImageI
GdipSaveImageToFile
GdipBitmapUnlockBits
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipDrawImageRectI
GdipGraphicsClear
imm32
ImmAssociateContext
ImmGetContext
ImmDestroyContext
ImmCreateContext
ImmReleaseContext
gdi32
GetStockObject
Rectangle
SetViewportOrgEx
GetObjectW
CreateDIBSection
SetBkMode
StretchBlt
GetViewportOrgEx
CreateSolidBrush
GetCurrentObject
EnumFontFamiliesExW
GetCharABCWidthsW
GetFontData
GetGlyphOutlineW
GetOutlineTextMetricsW
GetFontUnicodeRanges
GetGlyphIndicesW
GetTextExtentPointI
DeleteDC
DeleteObject
ExtCreateRegion
IntersectClipRect
SelectClipRgn
SelectObject
SetGraphicsMode
SetWorldTransform
CreateFontIndirectW
GetDeviceCaps
CreateBitmap
EnumFontsW
BitBlt
CreateCompatibleDC
GdiFlush
GetTextFaceW
ExtTextOutW
GetTextMetricsW
SetTextAlign
SetTextColor
RemoveFontMemResourceEx
AddFontMemResourceEx
oleaut32
SysAllocString
SysFreeString
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
ws2_32
htons
ntohs
setsockopt
WSASetLastError
htonl
inet_addr
inet_ntoa
gethostbyaddr
gethostbyname
getservbyport
getsockopt
__WSAFDIsSet
select
recvfrom
sendto
accept
listen
ioctlsocket
gethostname
getsockname
getpeername
connect
bind
WSACleanup
socket
closesocket
WSAGetLastError
send
recv
getservbyname
WSAStartup
usp10
ScriptShape
ScriptFreeCache
ScriptItemize
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 470KB - Virtual size: 469KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 376B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34.4MB - Virtual size: 34.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ