Static task
static1
Behavioral task
behavioral1
Sample
ToxTrac_v2.98_setup.exe
Resource
win10-20230915-en
General
-
Target
ToxTrac_v2.98_setup.exe
-
Size
57.9MB
-
MD5
948d35f74a7135b7941767acc66d9970
-
SHA1
5fa999d2b2e4b714a9a6f898c04581d3f9654b7d
-
SHA256
c40fcb805efd33b7272c3ebae06cc730c0ec0482be1357e83f243b4a2a0666ad
-
SHA512
cec7af256ae773b3ddfb0b938a3a1f484f3d6b2f85f51fe9742527a0080c804eb493f9b07e7cd426885d162aabb829e64ccd991b54ecf906460c48be194a413d
-
SSDEEP
1572864:+ZAaAUkj+P74iACBTQP5skWaoNdyJWuodzEFa33COiPjlY:6AaAn+P0iBTyskwdo9g3yJi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ToxTrac_v2.98_setup.exe
Files
-
ToxTrac_v2.98_setup.exe.exe windows:5 windows x86
f04a9ad2faa01cfb4ff3b4024cb4eb18
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
LoadLibraryExW
GetVersion
GetLocalTime
GetFileAttributesW
GetCurrentDirectoryW
FileTimeToLocalFileTime
GetFileTime
GetSystemDefaultUILanguage
GlobalAlloc
GlobalFree
FlushFileBuffers
VirtualQuery
IsBadReadPtr
GetDiskFreeSpaceExW
GetCurrentProcess
GetCurrentThread
InterlockedExchange
LoadLibraryExA
GetModuleHandleW
GetProcAddress
GetSystemDirectoryA
LoadLibraryA
GetLastError
SetLastError
CreateFileW
GetFileSize
CloseHandle
CreateFileMappingW
DeleteCriticalSection
UnmapViewOfFile
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
ReadFile
SetFilePointer
WriteFile
HeapAlloc
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
RaiseException
MulDiv
GetSystemInfo
FormatMessageW
LocalFree
MoveFileW
GetPrivateProfileStringW
GetSystemTimeAsFileTime
SetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
CreateDirectoryW
CompareFileTime
VerLanguageNameW
GetUserDefaultLangID
GetSystemDefaultLangID
FreeResource
lstrcmpA
SystemTimeToFileTime
ResetEvent
SetEvent
FindResourceExW
SetFileTime
OpenProcess
GetProcessTimes
ReadConsoleW
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
lstrcmpiW
lstrcmpW
IsValidLocale
GetLocaleInfoW
lstrcpyA
ExitThread
GetExitCodeProcess
WaitForSingleObject
GetCommandLineW
LoadLibraryW
FreeLibrary
CreateProcessW
CompareStringA
CompareStringW
lstrcatW
GetVersionExW
InterlockedDecrement
InterlockedIncrement
CreateEventW
QueryPerformanceFrequency
GetTempFileNameW
CopyFileW
GetTickCount
MapViewOfFile
GetExitCodeThread
CreateThread
FindResourceW
GlobalUnlock
GlobalLock
SizeofResource
LockResource
LoadResource
lstrcpyW
GetWindowsDirectoryW
SetErrorMode
GetTempPathW
ExpandEnvironmentStringsW
MoveFileExW
GetSystemDirectoryW
Sleep
RemoveDirectoryW
DeleteFileW
SetCurrentDirectoryW
lstrlenW
lstrcpynW
GetModuleFileNameW
GetProcessHeap
HeapFree
GetTimeFormatW
GetDateFormatW
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
HeapReAlloc
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetCurrentThreadId
HeapSize
GetModuleHandleExW
ExitProcess
GetStdHandle
IsProcessorFeaturePresent
IsDebuggerPresent
RtlUnwind
LCMapStringW
DecodePointer
EncodePointer
user32
MapWindowPoints
GetMessageW
TranslateMessage
DispatchMessageW
PostMessageW
DefWindowProcW
PostQuitMessage
RegisterClassW
CreateWindowExW
SetTimer
KillTimer
LoadCursorW
LoadIconW
wsprintfW
PeekMessageW
MsgWaitForMultipleObjects
GetDesktopWindow
ShowWindow
DialogBoxIndirectParamW
EndDialog
GetDlgItem
SetWindowTextW
CharPrevW
wvsprintfW
LoadImageW
CreateDialogParamW
MoveWindow
GetParent
GetWindowTextW
SetCursor
GetWindow
GetDlgItemTextW
SetFocus
SetForegroundWindow
SetActiveWindow
SetDlgItemTextW
FindWindowW
SubtractRect
IntersectRect
SetRect
FillRect
SetWindowPos
GetSysColor
GetDC
GetSystemMetrics
GetDlgCtrlID
CreateDialogIndirectParamW
ExitWindowsEx
CharUpperW
wsprintfA
CallWindowProcW
DrawIcon
DrawTextW
UpdateWindow
InvalidateRect
SetPropW
GetPropW
RemovePropW
GetSysColorBrush
DrawFocusRect
CopyRect
InflateRect
EnumChildWindows
GetClassNameW
MapDialogRect
RegisterClassExW
MonitorFromPoint
CharNextW
IsDialogMessageW
FindWindowExW
ScreenToClient
MessageBoxW
GetWindowRect
EnableWindow
SendDlgItemMessageW
DestroyWindow
IsWindow
SendMessageW
WaitForInputIdle
SetWindowLongW
GetWindowLongW
GetClientRect
EndPaint
BeginPaint
ReleaseDC
GetWindowDC
gdi32
CreateHalftonePalette
GetDIBColorTable
SelectPalette
RealizePalette
GetSystemPaletteEntries
CreatePalette
CreateFontW
SetTextColor
SetBkMode
GetDeviceCaps
CreateSolidBrush
GetObjectW
TranslateCharsetInfo
CreateFontIndirectW
SetStretchBltMode
StretchBlt
SelectObject
DeleteDC
CreateDIBitmap
CreateCompatibleDC
BitBlt
DeleteObject
GetStockObject
CreateCompatibleBitmap
CreateDCW
CreatePatternBrush
GetTextExtentPoint32W
RestoreDC
SaveDC
DeleteMetaFile
CreateBitmap
CreateRectRgn
PatBlt
PlayMetaFile
SelectClipRgn
SetBkColor
SetMapMode
SetMetaFileBitsEx
SetPixel
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
UnrealizeObject
advapi32
RegDeleteKeyW
RegOpenKeyExW
RegOpenKeyW
RegOverridePredefKey
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
OpenThreadToken
OpenProcessToken
SetEntriesInAclW
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CreateWellKnownSid
RegQueryInfoKeyW
RegEnumKeyExW
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
shell32
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteExW
CommandLineToArgvW
SHGetFolderPathW
ole32
CoUninitialize
CoInitializeSecurity
CoInitialize
CoTaskMemRealloc
CreateStreamOnHGlobal
CoTaskMemAlloc
CLSIDFromProgID
CoCreateGuid
CoCreateInstance
CoTaskMemFree
oleaut32
SysFreeString
VarBstrCmp
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VarBstrCat
VarBstrFromDate
VariantClear
VariantChangeType
GetErrorInfo
SysAllocStringLen
SysReAllocStringLen
VarUI4FromStr
SystemTimeToVariantTime
rpcrt4
RpcStringFreeW
UuidCreate
UuidToStringW
gdiplus
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromResource
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetInterpolationMode
GdipDrawImageRectI
GdipGetImageWidth
GdipGetImageHeight
GdipAlloc
GdipFree
GdiplusStartup
GdipCloneImage
GdipDisposeImage
Sections
.text Size: 591KB - Virtual size: 591KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 307KB - Virtual size: 307KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ