Static task
static1
Behavioral task
behavioral1
Sample
67796edfc8097ee4028276a3e2164af2a1ce525649a2b293be39ea319765df26.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
67796edfc8097ee4028276a3e2164af2a1ce525649a2b293be39ea319765df26.exe
Resource
win10v2004-20230915-en
General
-
Target
67796edfc8097ee4028276a3e2164af2a1ce525649a2b293be39ea319765df26
-
Size
1.7MB
-
MD5
1eac4013ee8acf1b96ffcbf690e69f7f
-
SHA1
69a10098966d9f9b878a7cb48f343cbb62821b89
-
SHA256
67796edfc8097ee4028276a3e2164af2a1ce525649a2b293be39ea319765df26
-
SHA512
bdf31cca7b7b7cf1d5310dfb8364e87d33d48419b3e71992e43cad4e34235990899290f48bf3972e572a2a7183b00095fd332af6cc8c2341a504a0f394c898d5
-
SSDEEP
49152:kqnqBYrOkeCHUHSoqLWzswpKrqXWOKKTw7lk2oilB8E3YVq:+cOZCHUHoLWzswpKrqXWOKKTw7lk2oi/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67796edfc8097ee4028276a3e2164af2a1ce525649a2b293be39ea319765df26
Files
-
67796edfc8097ee4028276a3e2164af2a1ce525649a2b293be39ea319765df26.exe windows:5 windows x86
954b892a0cfe1e2e30e72dc901b4caed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
SetErrorMode
GetStartupInfoW
RtlUnwind
GetFileAttributesA
GetDriveTypeA
FindFirstFileA
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitProcess
SetConsoleCtrlHandler
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
SetStdHandle
HeapSize
GetModuleFileNameA
GlobalReAlloc
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapCreate
VirtualFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
CreateFileA
LCMapStringW
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
LCMapStringA
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateProcessA
GetProcessHeap
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
FreeEnvironmentStringsA
GetEnvironmentStrings
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
lstrlenA
GetFileTime
GetFileSizeEx
SetFileAttributesW
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileAttributesExW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
MoveFileW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
lstrcmpW
FormatMessageW
LocalFree
lstrlenW
MulDiv
GlobalUnlock
GlobalFree
FreeResource
FlushConsoleInputBuffer
GetVersionExA
LoadLibraryA
GlobalMemoryStatus
GetCurrentProcessId
GetTickCount
GetFileType
GetModuleHandleA
GetVersion
GetFileAttributesW
GetFullPathNameW
InterlockedDecrement
GetVersionExW
SetThreadExecutionState
SetEvent
CreateEventW
CreateFileW
DeviceIoControl
GetLogicalDrives
GetSystemPowerStatus
GetPrivateProfileSectionNamesW
WritePrivateProfileSectionW
FreeConsole
AllocConsole
GetStdHandle
WriteConsoleW
GetConsoleScreenBufferInfo
GetCurrentDirectoryA
DeleteFileW
CopyFileW
GetCommandLineW
GetCurrentThreadId
QueryPerformanceFrequency
QueryPerformanceCounter
GetWindowsDirectoryW
GetCurrentDirectoryW
GetSystemDirectoryW
GetTempPathW
GetModuleFileNameW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileStringW
GlobalAlloc
FreeLibrary
GlobalLock
FindFirstFileW
FindNextFileW
FindClose
CreateDirectoryW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetDiskFreeSpaceExW
WideCharToMultiByte
SetLastError
GetProcAddress
GetModuleHandleW
LoadLibraryW
Sleep
SetCurrentDirectoryW
CreateMutexW
GetLastError
GetCurrentProcess
SetProcessAffinityMask
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
FreeEnvironmentStringsW
SizeofResource
user32
EndPaint
BeginPaint
MoveWindow
SetWindowTextW
IsDialogMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
EnableMenuItem
CheckMenuItem
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
GetTopWindow
GetMessageTime
MapWindowPoints
SetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetWindowThreadProcessId
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
SetWindowLongW
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
EnableWindow
RegisterWindowMessageW
UnregisterClassW
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindowEnabled
EndDialog
MessageBoxA
GetProcessWindowStation
GetUserObjectInformationW
IsWindowVisible
CharNextW
wsprintfW
PeekMessageW
SetWindowsHookExW
UnhookWindowsHookEx
MessageBoxW
GetDlgItem
CallNextHookEx
IsWindow
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetFocus
DrawEdge
PtInRect
GetKeyState
PostQuitMessage
ValidateRect
GetCursorPos
GetMessageW
TranslateMessage
DispatchMessageW
CharUpperW
GetSysColorBrush
LoadCursorW
DestroyMenu
ScreenToClient
AdjustWindowRectEx
UpdateWindow
SendMessageW
SetTimer
KillTimer
DestroyCursor
GetSysColor
SetCursor
GetWindowLongW
WindowFromPoint
GetParent
GetNextDlgTabItem
GetActiveWindow
InvalidateRect
ClientToScreen
DrawFocusRect
FrameRect
FillRect
OffsetRect
InflateRect
CopyRect
GetDC
ReleaseDC
DrawStateW
DestroyIcon
SetWindowPos
PostMessageW
LoadBitmapW
GetSystemMetrics
RedrawWindow
GetClientRect
DrawIcon
EnumWindows
SetForegroundWindow
IsIconic
ShowWindow
SendMessageTimeoutW
LoadIconW
GetDesktopWindow
GetWindowRect
GetMessagePos
gdi32
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
MoveToEx
LineTo
DeleteObject
SetBkMode
RestoreDC
SaveDC
GetClipBox
GetDeviceCaps
Rectangle
CreateFontIndirectW
RoundRect
CreatePen
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetTextExtentPoint32W
DPtoLP
CreateSolidBrush
GetObjectW
CreateCompatibleBitmap
CreateBitmap
CreateCompatibleDC
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
GetStockObject
SetMapMode
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegQueryValueExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegisterEventSourceA
ReportEventA
DeregisterEventSource
OpenSCManagerW
OpenServiceW
CloseServiceHandle
ControlService
InitiateSystemShutdownW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegFlushKey
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
shell32
CommandLineToArgvW
comctl32
_TrackMouseEvent
shlwapi
PathFileExistsW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathIsDirectoryW
PathRemoveFileSpecW
PathIsUNCW
ole32
CoTaskMemFree
CoSetProxyBlanket
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantChangeType
VariantInit
wintrust
WinVerifyTrust
setupapi
SetupDiGetDeviceRegistryPropertyW
SetupDiCreateDeviceInfoListExW
CM_Get_Device_ID_ExW
SetupDiEnumDeviceInfo
SetupDiGetDeviceInfoListDetailW
SetupDiOpenDeviceInfoW
SetupDiGetClassDevsExW
SetupDiGetDeviceInstallParamsW
SetupDiCallClassInstaller
SetupDiSetClassInstallParamsW
SetupDiSetDeviceRegistryPropertyW
SetupDiCreateDeviceInfoW
SetupDiCreateDeviceInfoList
SetupDiGetINFClassW
SetupCloseInfFile
SetupGetStringFieldW
SetupFindFirstLineW
SetupOpenInfFileW
SetupDiDestroyDeviceInfoList
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 193.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 349KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ