Static task
static1
Behavioral task
behavioral1
Sample
340dd99aa797e4b9f972f03cbc6d61c3f1862d6f98ef4cb0e14fefa1cff573df.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
340dd99aa797e4b9f972f03cbc6d61c3f1862d6f98ef4cb0e14fefa1cff573df.exe
Resource
win10v2004-20230915-en
General
-
Target
340dd99aa797e4b9f972f03cbc6d61c3f1862d6f98ef4cb0e14fefa1cff573df
-
Size
6.9MB
-
MD5
48cfd70cba21df6db00fb05d1404cde0
-
SHA1
46fa6c6fbb8cf9d323d1df7a97b270160984d874
-
SHA256
340dd99aa797e4b9f972f03cbc6d61c3f1862d6f98ef4cb0e14fefa1cff573df
-
SHA512
387a3a0c2129ad09e0787e9891e685edde6dbae44cacb2b002b96349d841aaa985b98293cc84162a11f3f85aa0bddda65457e9a267f5f86f1c2daffd1904a326
-
SSDEEP
196608:4WY3sZvt3tixuIqe12mRuAWy91UoP7HOmgGj:4WisZFtoMe12gu5O5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 340dd99aa797e4b9f972f03cbc6d61c3f1862d6f98ef4cb0e14fefa1cff573df
Files
-
340dd99aa797e4b9f972f03cbc6d61c3f1862d6f98ef4cb0e14fefa1cff573df.exe windows:5 windows x86
e85b12050fc2730f3bc0656bd996ea30
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathAppendW
PathRemoveFileSpecW
PathRemoveBackslashW
PathFileExistsA
PathIsDirectoryA
PathFindFileNameW
SHGetValueW
SHSetValueW
PathCanonicalizeW
PathIsRootW
PathRemoveExtensionW
PathFileExistsW
advapi32
RegisterEventSourceA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
DeregisterEventSource
ReportEventA
RegQueryValueExW
RegOpenKeyExW
kernel32
WaitForSingleObject
lstrcmpW
WideCharToMultiByte
MultiByteToWideChar
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetModuleHandleW
GetCurrentProcess
GetCurrentProcessId
CreateProcessW
CreateFileW
WriteFile
GetTempPathW
GetFileAttributesW
FindFirstFileW
RemoveDirectoryW
SetFileAttributesW
FindNextFileW
FindClose
CopyFileW
GetDiskFreeSpaceExW
GetTickCount
GetSystemDirectoryW
MoveFileExW
DeleteFileW
InterlockedCompareExchange
CreateMutexW
GetLastError
GetCommandLineW
CreateEventW
GetNativeSystemInfo
GetCurrentThreadId
GetUserDefaultUILanguage
FreeResource
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
SetFilePointer
SystemTimeToFileTime
CreateDirectoryW
GetCurrentDirectoryW
LocalFileTimeToFileTime
InterlockedIncrement
InterlockedDecrement
ExitProcess
lstrlenA
OpenProcess
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
OutputDebugStringA
Sleep
TerminateProcess
GlobalMemoryStatus
GetVersion
GetModuleHandleA
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
WriteConsoleW
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
SetConsoleCtrlHandler
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapCreate
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
GetStdHandle
GetTimeZoneInformation
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
GetDateFormatA
GetTimeFormatA
RtlUnwind
GetStartupInfoW
HeapSetInformation
InterlockedExchange
DecodePointer
EncodePointer
RaiseException
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
Process32FirstW
HeapAlloc
HeapDestroy
GetFileSizeEx
CreateDirectoryA
CreateFileA
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
Process32NextW
CreateToolhelp32Snapshot
GetModuleFileNameW
GetVersionExW
GetSystemInfo
FreeLibrary
GetProcAddress
LoadLibraryW
GetComputerNameExW
CloseHandle
CreateThread
LoadLibraryA
FlushConsoleInputBuffer
ReadConsoleInputA
SetConsoleMode
lstrlenW
user32
GetCursorPos
MessageBoxA
GetProcessWindowStation
GetUserObjectInformationW
GetMessageW
PostThreadMessageW
wsprintfW
FindWindowW
SendMessageW
PostQuitMessage
IsWindow
CreateWindowExW
SetFocus
SetWindowTextW
ShowWindow
MoveWindow
SetCursor
LoadCursorW
EnableWindow
MessageBoxW
GetClassInfoExW
HideCaret
GetFocus
ShowCaret
GetSysColor
CreateCaret
SetCaretPos
SystemParametersInfoW
GetDC
ReleaseDC
GetSystemMetrics
SetRectEmpty
SetTimer
KillTimer
DrawTextW
DrawFocusRect
PostMessageW
ClientToScreen
SetWindowRgn
ScreenToClient
SetActiveWindow
LoadImageW
SetCapture
IsZoomed
GetKeyState
IsWindowEnabled
TranslateMessage
OffsetRect
BringWindowToTop
PeekMessageW
GetDesktopWindow
IntersectRect
GetActiveWindow
ReleaseCapture
MapWindowPoints
UpdateWindow
CallWindowProcW
GetWindow
DispatchMessageW
GetParent
PtInRect
GetWindowRect
EndPaint
UpdateLayeredWindow
GetClientRect
BeginPaint
MonitorFromWindow
GetMonitorInfoW
SetWindowPos
DestroyWindow
InvalidateRect
DefWindowProcW
GetWindowLongW
SetWindowLongW
RegisterClassExW
gdi32
SetBkMode
CreateFontIndirectW
ExtSelectClipRgn
GetTextColor
BitBlt
SetBkColor
SetRectRgn
CombineRgn
GetDeviceCaps
SetTextColor
GetObjectW
SelectClipRgn
CreateCompatibleBitmap
OffsetRgn
CreateRectRgn
DeleteDC
DeleteObject
SelectObject
CreateDIBSection
CreateCompatibleDC
ExtTextOutW
CreateRectRgnIndirect
GetClipBox
shell32
ord165
SHGetSpecialFolderPathW
ShellExecuteW
SHBrowseForFolderW
SHGetMalloc
SHGetPathFromIDListW
ole32
CoCreateInstance
CoInitialize
OleInitialize
CoUninitialize
CoCreateGuid
oleaut32
SysFreeString
comctl32
_TrackMouseEvent
ord17
msimg32
AlphaBlend
GradientFill
riched20
ord4
winhttp
WinHttpAddRequestHeaders
WinHttpReadData
WinHttpReceiveResponse
WinHttpOpenRequest
WinHttpOpen
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpCrackUrl
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpConnect
Sections
.text Size: 890KB - Virtual size: 890KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23.4MB - Virtual size: 23.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ