Static task
static1
Behavioral task
behavioral1
Sample
61b2839e4767f03748618c19274cfb5f2d885fb50bb2faf8bf451b2803e1e592.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
61b2839e4767f03748618c19274cfb5f2d885fb50bb2faf8bf451b2803e1e592.exe
Resource
win10v2004-20230915-en
General
-
Target
61b2839e4767f03748618c19274cfb5f2d885fb50bb2faf8bf451b2803e1e592
-
Size
712KB
-
MD5
4c78345914d95b83097abacdadfdecc0
-
SHA1
fe1fe46b08fd998f4e3bda167ad54c34702491cd
-
SHA256
61b2839e4767f03748618c19274cfb5f2d885fb50bb2faf8bf451b2803e1e592
-
SHA512
e8176f8da8b9846a9eeefbd1d1370210a895105085ecaea85f6ce97d37097814c6ed98eb767d183e7990061f4b8503bea353db3bb1b5fc334bdc98f3396babd6
-
SSDEEP
12288:fOtqbPqorI3UdUwVmHGnFidtTxQTvLd+lgZPI6IIIIIjivvvvNEE6KP:f63iUwVmHnC+sUKP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61b2839e4767f03748618c19274cfb5f2d885fb50bb2faf8bf451b2803e1e592
Files
-
61b2839e4767f03748618c19274cfb5f2d885fb50bb2faf8bf451b2803e1e592.exe windows:4 windows x86
4b7d9ec5e1bc4d56deea45b8a6b44dfc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
HeapReAlloc
ExitThread
CreateThread
ExitProcess
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetCurrentDirectoryA
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GetStartupInfoW
GetProcessHeap
HeapAlloc
HeapFree
GetTickCount
GetFileTime
GetFileAttributesW
SetErrorMode
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
lstrlenA
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetVersionExW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
FindFirstFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FindClose
CreateEventW
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
WideCharToMultiByte
GetCurrentProcessId
InterlockedDecrement
GlobalFree
GlobalAlloc
FormatMessageW
LocalFree
lstrlenW
GlobalLock
GlobalUnlock
MulDiv
GetModuleHandleA
FreeResource
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
FreeLibrary
GetVersion
GetModuleFileNameW
GetDriveTypeW
TerminateProcess
WaitForSingleObject
CopyFileW
CloseHandle
GetFileSize
CreateFileW
MultiByteToWideChar
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetLastError
SetLastError
FindResourceW
LoadResource
LockResource
Sleep
SizeofResource
user32
SetRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatW
PostThreadMessageW
PostQuitMessage
GetMessageW
TranslateMessage
ValidateRect
GetDesktopWindow
CreateDialogIndirectParamW
EndDialog
GetWindowThreadProcessId
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
GetMenuState
GetCursorPos
IsWindowEnabled
EndPaint
BeginPaint
GetWindowDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
IsRectEmpty
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
IsWindow
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
GetKeyState
SetForegroundWindow
IsWindowVisible
GetMenu
GetMenuItemID
GetMenuItemCount
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
ScreenToClient
EqualRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
IsZoomed
AppendMenuW
GetSystemMenu
DrawIcon
GetSystemMetrics
LoadBitmapW
IsIconic
CheckMenuItem
CopyAcceleratorTableW
CharNextW
ReleaseCapture
SetCapture
CharUpperW
LoadIconW
SystemParametersInfoW
GetFocus
UpdateWindow
PtInRect
UnregisterClassW
GetSysColorBrush
SetWindowContextHelpId
CallNextHookEx
MapDialogRect
LockWindowUpdate
DestroyCursor
CopyRect
InvalidateRect
DrawFocusRect
LoadCursorW
InflateRect
SetCursor
DrawStateW
FillRect
GetParent
GetNextDlgTabItem
OffsetRect
PostMessageW
TrackPopupMenuEx
SendMessageW
FrameRect
LoadImageW
GetSubMenu
EnableWindow
GetWindowLongW
ReleaseDC
GetWindowRect
DestroyIcon
GetDC
GetActiveWindow
WindowFromPoint
LoadMenuW
ClientToScreen
GetSysColor
DestroyMenu
GetClientRect
DispatchMessageW
UnregisterClassA
gdi32
ExtSelectClipRgn
GetDeviceCaps
CreatePen
ScaleWindowExtEx
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetObjectW
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetClipBox
GetTextExtentPoint32W
CreateSolidBrush
StretchBlt
CreateFontIndirectW
BitBlt
CreateCompatibleBitmap
GetStockObject
DeleteDC
SetTextColor
SetBkColor
SelectObject
CreateCompatibleDC
DeleteObject
CreateBitmap
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegCreateKeyExW
RegOpenKeyW
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteExW
comctl32
_TrackMouseEvent
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
PathIsUNCW
oledlg
OleUIBusyW
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CoRevokeClassObject
CoTaskMemAlloc
CoTaskMemFree
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromProgID
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysFreeString
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
Sections
.text Size: 280KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 348KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE