Static task
static1
Behavioral task
behavioral1
Sample
5d6e12500b05d2398291331eb738ba22ac3de104b241cc0ff8b8818f97daa8da.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5d6e12500b05d2398291331eb738ba22ac3de104b241cc0ff8b8818f97daa8da.exe
Resource
win10v2004-20230915-en
General
-
Target
5d6e12500b05d2398291331eb738ba22ac3de104b241cc0ff8b8818f97daa8da
-
Size
6.4MB
-
MD5
f9d5b356c4e6297cd74ec0b6f00959fb
-
SHA1
811264a14db11b9e6b60ee0ab37ea69eb54a5c4c
-
SHA256
5d6e12500b05d2398291331eb738ba22ac3de104b241cc0ff8b8818f97daa8da
-
SHA512
506cfdea0e12f048820844c19781320fcfb7dd1f03712a894953e21c140a357bfff89b7620b994a8ed582de3ab8cc013011d617842a812a7e87805c63b7704b3
-
SSDEEP
98304:/uTYPeiTZRbx26ZVBnX61vdwtxpEgK9JBAUZLq4:NR26kFwtPK9JV7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d6e12500b05d2398291331eb738ba22ac3de104b241cc0ff8b8818f97daa8da
Files
-
5d6e12500b05d2398291331eb738ba22ac3de104b241cc0ff8b8818f97daa8da.exe windows:4 windows x86
49810c158f8c5b3a7b62ec3c344e8def
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundA
waveOutUnprepareHeader
waveOutPrepareHeader
waveOutWrite
waveOutPause
midiStreamRestart
midiStreamClose
midiOutUnprepareHeader
midiStreamOpen
midiOutReset
midiStreamStop
midiStreamProperty
midiStreamOut
midiOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutClose
waveOutReset
ws2_32
WSAStartup
WSACleanup
select
closesocket
WSAAsyncSelect
htons
inet_addr
recvfrom
ioctlsocket
connect
recv
getpeername
accept
socket
inet_ntoa
send
gethostbyname
msvfw32
DrawDibDraw
avifil32
AVIStreamInfoA
AVIStreamGetFrame
rasapi32
RasGetConnectStatusA
RasHangUpA
kernel32
GetVersion
IsDBCSLeadByte
lstrcmpA
lstrcmpiA
lstrcpynA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetTimeZoneInformation
TerminateThread
SetSystemPowerState
Beep
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileType
DuplicateHandle
GetLocalTime
InterlockedIncrement
InterlockedDecrement
LocalFree
FormatMessageA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetStringTypeExA
GetThreadLocale
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
TlsSetValue
LocalReAlloc
TlsGetValue
GetFileTime
GetCurrentThread
GlobalFlags
SetErrorMode
GetProcessVersion
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
GetSystemTime
RaiseException
HeapSize
GetACP
SetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetCurrentProcessId
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
SetLastError
GetSystemDirectoryA
LoadLibraryExA
GetWindowsDirectoryA
TerminateProcess
GetCurrentProcess
GetFileSize
SetFilePointer
GetTempFileNameA
CreateSemaphoreA
ResumeThread
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
GetProfileStringA
WriteFile
WaitForMultipleObjects
CreateFileA
DeviceIoControl
SetEvent
FindResourceA
LoadResource
LockResource
ReadFile
lstrlenW
RemoveDirectoryA
GetModuleFileNameA
GetCurrentThreadId
ExitProcess
GlobalSize
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
lstrcatA
lstrlenA
WinExec
lstrcpyA
FindNextFileA
GlobalReAlloc
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
GetUserDefaultLCID
MultiByteToWideChar
WideCharToMultiByte
GetFullPathNameA
FreeLibrary
LoadLibraryA
GetLastError
GetVersionExA
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateThread
CreateEventA
Sleep
ExpandEnvironmentStringsA
GlobalAlloc
GlobalLock
GlobalUnlock
GetTempPathA
FindFirstFileA
FindClose
GetFileAttributesA
MoveFileA
DeleteFileA
CopyFileA
CreateDirectoryA
SetCurrentDirectoryA
GetVolumeInformationA
GetModuleHandleA
GetProcAddress
MulDiv
SetLocalTime
GetCommandLineA
GetTickCount
CreateProcessA
WaitForSingleObject
CloseHandle
InterlockedExchange
VirtualProtect
VirtualQuery
GetSystemInfo
InterlockedCompareExchange
FlushViewOfFile
user32
GetNextDlgGroupItem
PostThreadMessageA
MapDialogRect
SetWindowContextHelpId
CharNextA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
CheckMenuItem
IsDialogMessageA
ScrollWindowEx
SendDlgItemMessageA
MapWindowPoints
AdjustWindowRectEx
GetScrollPos
RegisterClassA
CreateWindowExA
GetClassLongA
RemovePropA
GetMessageTime
GetLastActivePopup
RegisterWindowMessageA
GetWindowPlacement
EndDialog
CreateDialogIndirectParamA
DestroyWindow
EndPaint
BeginPaint
GetWindowTextLengthA
GetNextDlgTabItem
CreateIconIndirect
GetIconInfo
CopyIcon
LoadStringA
ExitWindowsEx
GetForegroundWindow
CharUpperA
UnregisterClassA
GetDlgItem
mouse_event
GetClassNameA
GetDesktopWindow
GetWindowTextA
SetWindowTextA
GetMenuItemCount
GetMenuItemID
GetMenuStringA
GetMenuState
GetTabbedTextExtentA
DrawStateA
GrayStringA
TabbedTextOutA
WindowFromDC
EnumChildWindows
GetWindowDC
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
FrameRect
GetPropA
MoveWindow
CallWindowProcA
SetPropA
DrawTextA
GetCursor
LoadIconA
TranslateMessage
DrawFrameControl
DrawEdge
GetSysColorBrush
WindowFromPoint
GetMessageA
DispatchMessageA
SetRectEmpty
RegisterClipboardFormatA
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
CreatePopupMenu
AppendMenuA
ModifyMenuA
CreateMenu
CreateAcceleratorTableA
GetDlgCtrlID
GetSubMenu
EnableMenuItem
ClientToScreen
EnumDisplaySettingsA
LoadImageA
SystemParametersInfoA
ShowWindow
IsWindowEnabled
TranslateAcceleratorA
GetKeyState
CopyAcceleratorTableA
PostQuitMessage
IsZoomed
GetClassInfoA
DefWindowProcA
GetSystemMenu
DeleteMenu
GetMenu
SetMenu
PeekMessageA
IsIconic
SetFocus
GetActiveWindow
GetWindow
DestroyAcceleratorTable
SetWindowRgn
GetMessagePos
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
KillTimer
SetTimer
ReleaseCapture
GetCapture
SetCapture
GetScrollRange
SetScrollRange
SetScrollPos
SetRect
InflateRect
IntersectRect
DestroyIcon
PtInRect
OffsetRect
IsWindowVisible
EnableWindow
RedrawWindow
GetWindowLongA
SetWindowLongA
GetSysColor
SetActiveWindow
SetCursorPos
LoadCursorA
SetCursor
GetDC
FillRect
InvertRect
IsRectEmpty
ScrollDC
ReleaseDC
IsChild
TrackPopupMenu
DestroyMenu
SetForegroundWindow
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
GetFocus
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBeep
MessageBoxA
GetCursorPos
GetSystemMetrics
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
WaitForInputIdle
DrawFocusRect
WinHelpA
FindWindowExA
gdi32
CreateBrushIndirect
CreateDCA
CreateCompatibleBitmap
GetPolyFillMode
CreateHatchBrush
CreateBitmap
GetStretchBltMode
CreatePatternBrush
SelectObject
CreatePen
PatBlt
CombineRgn
CreateRectRgn
GetROP2
FillRgn
CreateSolidBrush
CreateFontIndirectA
GetBkColor
GetStockObject
GetBkMode
GetTextColor
CreateRoundRectRgn
CreateEllipticRgn
PathToRegion
EndPath
BeginPath
SetPolyFillMode
GetObjectA
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
EndPage
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ExcludeClipRect
ExtSelectClipRgn
GetViewportExtEx
GetMapMode
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreatePenIndirect
RestoreDC
SaveDC
SetWindowOrgEx
SetTextColor
SetBkMode
SetBkColor
CreateRectRgnIndirect
CreateDIBSection
SetPixel
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
DeleteObject
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
EndDoc
DeleteDC
StartDocA
StartPage
BitBlt
GetPixel
CreateCompatibleDC
ScaleViewportExtEx
SetDIBitsToDevice
StretchDIBits
MoveToEx
LineTo
GetTextMetricsA
OffsetRgn
FrameRgn
SetPixelV
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
Pie
Chord
Arc
Polygon
GetTextExtentPoint32A
SetROP2
GetDeviceCaps
StretchBlt
SelectPalette
RealizePalette
GetDIBits
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
msimg32
GradientFill
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comdlg32
GetFileTitleA
GetOpenFileNameA
ChooseFontA
ChooseColorA
GetSaveFileNameA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
OpenProcessToken
RegQueryValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
Shell_NotifyIconA
ShellExecuteA
DragQueryFileA
ole32
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
ReleaseStgMedium
RevokeDragDrop
RegisterDragDrop
OleInitialize
OleUninitialize
CLSIDFromString
CoCreateInstance
OleRun
oleaut32
VariantInit
VariantCopyInd
SafeArrayGetElement
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
VariantChangeType
VariantClear
VariantCopy
OleCreatePictureIndirect
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantTimeToSystemTime
SysStringLen
SysAllocStringLen
SysAllocString
SafeArrayDestroy
SafeArrayCreate
SafeArrayPutElement
OleCreateFontIndirect
UnRegisterTypeLi
SysFreeString
SafeArrayGetElemsize
SysAllocStringByteLen
comctl32
ImageList_Duplicate
ImageList_DrawIndirect
ImageList_Write
ImageList_Read
ImageList_ReplaceIcon
ImageList_LoadImageA
ImageList_Create
ImageList_Destroy
ImageList_GetIcon
ImageList_GetImageInfo
ImageList_GetImageCount
ImageList_SetBkColor
ImageList_Draw
_TrackMouseEvent
ImageList_AddMasked
ord17
oledlg
ord8
wininet
InternetCloseHandle
InternetOpenA
InternetReadFile
HttpQueryInfoA
InternetSetOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
InternetConnectA
wldap32
ord29
Sections
.text Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 176KB - Virtual size: 673KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ