Static task
static1
Behavioral task
behavioral1
Sample
059f4d2111cd9b0c62f2c7cdbeafb7b0459121f34482b5b70aa94b07464c1a97.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
059f4d2111cd9b0c62f2c7cdbeafb7b0459121f34482b5b70aa94b07464c1a97.exe
Resource
win10v2004-20230915-en
General
-
Target
059f4d2111cd9b0c62f2c7cdbeafb7b0459121f34482b5b70aa94b07464c1a97
-
Size
15.3MB
-
MD5
662be7096bfe3163f71f78d8d3da6b82
-
SHA1
64fe6c428342660c9f982983ba38cd6fd7422209
-
SHA256
059f4d2111cd9b0c62f2c7cdbeafb7b0459121f34482b5b70aa94b07464c1a97
-
SHA512
2c07f6fb0e49e778e645845f2f4b56db035ff3a11194b0739cff758378201f8dbbdb97450d5438b5820cc2a0aa53216b3ac22364aa3a17ec0531793b15d7bd39
-
SSDEEP
196608:z+6k1mloMJsI5SiGZtGzQn8ktRyPBfakJrN/VC3c7+vADDlXYOXYuQcg8ktR2+fK:z+6k12oiO8zbfRqRADDloO5QZfYv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 059f4d2111cd9b0c62f2c7cdbeafb7b0459121f34482b5b70aa94b07464c1a97
Files
-
059f4d2111cd9b0c62f2c7cdbeafb7b0459121f34482b5b70aa94b07464c1a97.exe windows:6 windows x86
f644d5d6c48cfabdafeb9220db3dd489
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
FreeResource
LockResource
LoadResource
FindResourceW
GetTickCount
GetUserDefaultLCID
LoadLibraryW
FreeLibrary
CreateDirectoryW
ReadFile
GetCommandLineW
RemoveDirectoryW
CreatePipe
PeekNamedPipe
GetFileAttributesW
GlobalFlags
GetSystemInfo
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateProcessW
CopyFileW
VirtualQuery
GenerateConsoleCtrlEvent
GetExitCodeProcess
ResetEvent
GetLocalTime
GetSystemTimeAsFileTime
FlushInstructionCache
lstrcmpiW
LoadLibraryExW
GetCurrentProcess
IsBadCodePtr
FlushFileBuffers
WriteConsoleW
SetEnvironmentVariableW
SetEvent
GlobalUnlock
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileSizeEx
SetEndOfFile
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
ReadConsoleW
SetStdHandle
GetStdHandle
GetCommandLineA
GetFileType
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
QueryPerformanceCounter
GetStartupInfoW
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCPInfo
LCMapStringEx
GetStringTypeW
LoadLibraryExA
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
GetEnvironmentVariableW
OutputDebugStringA
WaitForMultipleObjects
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
WriteFile
VirtualQueryEx
GetProcessId
CreateSemaphoreW
SetUnhandledExceptionFilter
CreateFileW
MulDiv
GlobalLock
GlobalAlloc
GlobalFree
GlobalSize
GetEnvironmentStringsW
GetModuleFileNameW
GetTempPathW
GetSystemDirectoryW
GetWindowsDirectoryW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetTickCount64
GetTimeZoneInformation
Sleep
VirtualFree
VirtualAlloc
VirtualProtect
LoadLibraryA
GetModuleHandleA
MoveFileW
LeaveCriticalSection
EnterCriticalSection
TryEnterCriticalSection
GetComputerNameW
CreateEventW
OpenEventW
SetWaitableTimer
CreateWaitableTimerW
CreateThread
TerminateThread
GetExitCodeThread
TerminateProcess
OpenProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
InitializeCriticalSection
IsDebuggerPresent
DebugBreak
GetModuleFileNameA
DeleteCriticalSection
GetCurrentThreadId
GetModuleHandleW
GetProcessHeap
GetCurrentProcessId
CreateMutexExW
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
CloseHandle
HeapReAlloc
OpenSemaphoreW
WaitForSingleObjectEx
OutputDebugStringW
GetLastError
FormatMessageW
HeapSize
ReleaseMutex
WaitForSingleObject
InitializeCriticalSectionEx
GetModuleHandleExW
ReleaseSemaphore
SetLastError
HeapFree
CreateSemaphoreExW
FreeEnvironmentStringsW
user32
GetSubMenu
DestroyAcceleratorTable
CreateAcceleratorTableW
DestroyMenu
TranslateAcceleratorW
AppendMenuW
TrackPopupMenu
CreatePopupMenu
DeleteMenu
GetMenuItemCount
GetMenu
ModifyMenuW
wsprintfW
DestroyIcon
UnregisterClassW
MessageBoxW
SendMessageW
MsgWaitForMultipleObjects
PeekMessageW
TranslateMessage
DispatchMessageW
FindWindowW
FindWindowExW
GetWindowRect
GetMonitorInfoW
GetWindowTextLengthW
GetWindowTextW
CharNextW
PostQuitMessage
GetDlgItem
FillRect
RedrawWindow
EndPaint
GetNextDlgTabItem
BeginPaint
IntersectRect
IsRectEmpty
SetMenu
IsChild
GetDlgCtrlID
IsWindowEnabled
DrawIcon
SetWindowRgn
GetSystemMenu
GetLastActivePopup
PtInRect
OffsetRect
MessageBeep
DrawTextW
SetRect
IsZoomed
GetTopWindow
CreateMenu
GetCursorPos
MonitorFromWindow
SetActiveWindow
WaitForInputIdle
OpenClipboard
CloseClipboard
EmptyClipboard
GetKeyState
SetWindowPos
PostMessageW
MoveWindow
IsIconic
ShowScrollBar
IsWindow
GetWindowThreadProcessId
GetClassNameW
IsWindowVisible
GetPropW
CallWindowProcW
RemovePropW
GetWindowLongW
SetWindowLongW
InvalidateRect
ShowWindow
SetParent
GetActiveWindow
DefWindowProcW
WinHelpW
GetClipboardData
SetClipboardData
DestroyWindow
GetMessageW
ClientToScreen
GetClassInfoExW
RegisterClassExW
IsDialogMessageW
GetSysColor
SetWindowTextW
EnableWindow
GetParent
ScreenToClient
GetFocus
CreateWindowExW
LoadStringW
SetPropW
LoadIconW
LoadCursorW
GetDesktopWindow
LoadImageW
GetDC
GetSystemMetrics
GetWindowDC
GetClientRect
ReleaseDC
EnumWindows
AdjustWindowRectEx
GetWindow
SetCursor
SetFocus
gdi32
CombineRgn
CreateRectRgn
GetTextMetricsW
ExcludeClipRect
GetClipBox
SetBkMode
SelectObject
CreateDIBSection
SetDIBColorTable
CreateCompatibleDC
DeleteObject
SetStretchBltMode
GetObjectW
DeleteDC
GetDeviceCaps
CreateRoundRectRgn
CreateEllipticRgn
SetTextColor
SetBkColor
CreateSolidBrush
CreateFontIndirectW
GdiAlphaBlend
GetStockObject
comdlg32
GetSaveFileNameW
ChooseFontW
GetOpenFileNameW
advapi32
RegGetValueW
EventWriteTransfer
EventSetInformation
EventRegister
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegDeleteValueW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCloseKey
RegCreateKeyExW
RegSetValueExW
OpenProcessToken
RegOpenKeyExW
RegQueryValueExW
EventUnregister
shell32
DragFinish
DragQueryFileW
SHGetSpecialFolderPathW
ShellExecuteW
Shell_NotifyIconW
ole32
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateGuid
CreateStreamOnHGlobal
CoInitializeEx
CLSIDFromProgID
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VarUI4FromStr
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantInit
SysAllocString
SysFreeString
comctl32
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
InitCommonControlsEx
ImageList_GetIcon
hpsocket_u
HP_Destroy_TcpPullClient
HP_Create_TcpPullClient
gdiplus
GdipCreateBitmapFromFile
GdipGetImageWidth
GdipSetCompositingMode
GdiplusStartup
GdiplusShutdown
GdipGetImageHeight
GdipGetImagePaletteSize
GdipCloneImage
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipAlloc
GdipDrawImageRectI
GdipDisposeImage
GdipGetImagePixelFormat
GdipFree
GdipBitmapLockBits
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipGetImagePalette
GdipCreateBitmapFromScan0
ntdll
RtlCaptureContext
psapi
EnumProcesses
shlwapi
PathFileExistsW
PathIsDirectoryW
ws2_32
WSACleanup
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 378KB - Virtual size: 378KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13.4MB - Virtual size: 13.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ