_Start@12
Static task
static1
Behavioral task
behavioral1
Sample
1d1286ab5ff4fec11a161a8c3db4608cc1dc0a0014b04a1499f8b5eec203073e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1d1286ab5ff4fec11a161a8c3db4608cc1dc0a0014b04a1499f8b5eec203073e.exe
Resource
win10v2004-20230915-en
General
-
Target
1d1286ab5ff4fec11a161a8c3db4608cc1dc0a0014b04a1499f8b5eec203073e
-
Size
10.2MB
-
MD5
9eca5c0743a63a9776f181081452a03c
-
SHA1
301417f75e5fca6e8574558fa861d796d4e765d9
-
SHA256
1d1286ab5ff4fec11a161a8c3db4608cc1dc0a0014b04a1499f8b5eec203073e
-
SHA512
ddcac1e4816451c91db010ea79332c52a63bf2efb142c0a7556fc0892d93a19ba359db45faf4f42f1710a422488c9b56f0f98ff286da227e0a9b922a44ec576a
-
SSDEEP
196608:5xd7N7VjLPS5NCdpir16ZgH1nBFyvO4LhvwMwqWzaoUDn:x9ZLP4sdgnBQhNwqWRUb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d1286ab5ff4fec11a161a8c3db4608cc1dc0a0014b04a1499f8b5eec203073e
Files
-
1d1286ab5ff4fec11a161a8c3db4608cc1dc0a0014b04a1499f8b5eec203073e.exe windows:5 windows x86
88eb3ed7a665b5bae7d249a523701bd5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
SetFilePointer
CloseHandle
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
CreateFileW
GetFileAttributesExW
GetLongPathNameW
OpenProcess
GetCurrentProcessId
GetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
GetModuleFileNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
RaiseException
GetCurrentThreadId
SetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
LockResource
FreeLibrary
SetEvent
WaitForSingleObject
WaitForMultipleObjects
SizeofResource
CreateEventW
HeapDestroy
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MulDiv
GetProcAddress
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
LoadLibraryW
GetModuleHandleW
WideCharToMultiByte
LockFile
UnlockFile
GetFileSize
ReadFile
DecodePointer
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
LoadLibraryExW
DeleteFileW
MoveFileExW
LocalFree
FindClose
lstrlenW
RemoveDirectoryW
GetFullPathNameW
SetFileAttributesW
GetFileAttributesW
FindFirstFileW
FindNextFileW
WriteFile
GetLogicalDriveStringsW
GetDriveTypeW
GetTempPathW
GetDiskFreeSpaceExW
GetTempFileNameW
Sleep
GetTickCount
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
FindFirstFileExA
ReadConsoleW
SetEndOfFile
SetStdHandle
SetConsoleCtrlHandler
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
WriteConsoleW
GetACP
GetStdHandle
GetModuleFileNameA
ExitProcess
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
InterlockedFlushSList
RtlUnwind
CreateFileA
lstrcmpiA
lstrcmpA
DeviceIoControl
ResetEvent
GetSystemWindowsDirectoryW
FreeResource
InterlockedCompareExchange
GetThreadSelectorEntry
ResumeThread
SuspendThread
GetThreadContext
GetThreadPriority
SetThreadPriority
OpenThread
GetCurrentThread
GetWindowsDirectoryW
GetSystemDirectoryW
FindNextFileA
FindFirstFileA
FlushFileBuffers
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ReleaseMutex
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
OpenFileMappingW
GetFileSizeEx
GetStringTypeW
FormatMessageW
SwitchToThread
TlsAlloc
GetVersionExW
VirtualQuery
GetSystemTimeAsFileTime
GetModuleHandleA
CreateEventA
GetModuleFileNameW
LoadLibraryA
TerminateProcess
GetCurrentProcess
GetSystemInfo
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
FreeLibrary
GetTickCount
GlobalFree
GetProcAddress
LocalAlloc
LocalFree
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
GetLastError
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
user32
LoadImageW
SetWindowTextW
GetSystemMetrics
MoveWindow
PostQuitMessage
CharNextW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
GetShellWindow
SystemParametersInfoW
SetWindowRgn
IsWindowVisible
UpdateLayeredWindow
RegisterWindowMessageW
ShowWindow
GetMonitorInfoW
MonitorFromWindow
IsDialogMessageW
GetWindow
GetParent
ScreenToClient
GetWindowRect
EndDialog
DialogBoxParamW
BringWindowToTop
SetWindowPos
IsRectEmpty
RedrawWindow
SetCursor
CopyRect
PtInRect
OffsetRect
SetRect
IsWindow
ReleaseDC
GetDC
KillTimer
SetTimer
GetClientRect
GetWindowTextLengthW
GetWindowTextW
InvalidateRect
EndPaint
BeginPaint
DrawTextW
LoadCursorW
SetWindowLongW
GetWindowLongW
DestroyWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
CallWindowProcW
DefWindowProcW
PostMessageW
SendMessageW
GetWindowThreadProcessId
FindWindowExW
wsprintfW
FindWindowW
UnregisterClassA
DrawFocusRect
MapWindowPoints
GetUserObjectInformationW
CharUpperBuffW
MessageBoxW
GetProcessWindowStation
oleaut32
SysFreeString
SysAllocString
VariantClear
VarUI4FromStr
VariantInit
wtsapi32
WTSSendMessageW
Exports
Exports
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx0 Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.upx1 Size: 5.3MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE