Static task
static1
Behavioral task
behavioral1
Sample
735dd31d85e7b7d2e4e2eaebe8ab67e30a4ee6e85230ead6c0637f7a05f719a7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
735dd31d85e7b7d2e4e2eaebe8ab67e30a4ee6e85230ead6c0637f7a05f719a7.exe
Resource
win10v2004-20230915-en
General
-
Target
735dd31d85e7b7d2e4e2eaebe8ab67e30a4ee6e85230ead6c0637f7a05f719a7
-
Size
4.9MB
-
MD5
ca5f6b612bc4f91f444dd2c26757d2de
-
SHA1
195e5529af56b46ad1dfddfbec714bd08b0d7f8d
-
SHA256
735dd31d85e7b7d2e4e2eaebe8ab67e30a4ee6e85230ead6c0637f7a05f719a7
-
SHA512
1608c65b7395974f9639b2dce70d24343301ef66c06f6e36b902bac6f86938e3a1725b7b6c901e4c3400894965836be4ab97a87f4b71df7f0b38027bad045c8d
-
SSDEEP
98304:rcYg7K+m1XgXXm5LEg2BWEY05oeaBqQECFMKe7bWkOSP12UCn:Zgm+RmCg+WN05ZaBFMKe7qkO41nCn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 735dd31d85e7b7d2e4e2eaebe8ab67e30a4ee6e85230ead6c0637f7a05f719a7
Files
-
735dd31d85e7b7d2e4e2eaebe8ab67e30a4ee6e85230ead6c0637f7a05f719a7.exe windows:6 windows x86
25b056b45d8a7d290f0d9a1461593ed7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
PeekNamedPipe
VerSetConditionMask
LoadLibraryA
GetModuleHandleA
VerifyVersionInfoA
HeapFree
GetFileType
GetCurrentDirectoryW
GetFileAttributesW
LocalFileTimeToFileTime
SetFilePointer
SetFileTime
MulDiv
GetACP
WaitForMultipleObjects
FreeLibrary
FormatMessageA
SleepEx
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetLastError
CreateMutexW
IsBadCodePtr
ExpandEnvironmentStringsA
MoveFileW
CopyFileW
CreateEventW
FreeResource
lstrlenW
FormatMessageW
K32GetDeviceDriverBaseNameA
K32EnumDeviceDrivers
DeleteFileW
FindClose
FindNextFileW
OutputDebugStringW
DeleteFileA
GetTickCount
SystemTimeToFileTime
GetCurrentProcessId
GetLocalTime
GetExitCodeProcess
GlobalUnlock
lstrcmpiW
CreateDirectoryA
GetModuleHandleW
GetFileSize
GlobalLock
GetProcAddress
SetCurrentDirectoryW
CreateThread
LoadLibraryW
GetSystemInfo
CloseHandle
Process32FirstW
GlobalAlloc
GetSystemDirectoryA
Process32NextW
GetDiskFreeSpaceA
Sleep
CreateToolhelp32Snapshot
OpenProcess
CreateFileW
WaitForSingleObject
GetTempPathW
GetProcessId
GetModuleFileNameW
TerminateProcess
DeviceIoControl
WriteFile
GetCurrentProcess
GetFileSizeEx
ReadFile
CreateDirectoryW
WideCharToMultiByte
MultiByteToWideChar
GetComputerNameW
LocalFree
GetSystemDirectoryW
GetVolumeInformationW
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
FindResourceW
LoadResource
FindResourceExW
RaiseException
HeapReAlloc
WriteConsoleW
SetEndOfFile
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
SetStdHandle
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FlushFileBuffers
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
SetFilePointerEx
FreeLibraryAndExitThread
ExitThread
GetModuleHandleExW
LoadLibraryExW
RtlUnwind
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
EncodePointer
LockResource
GetLastError
HeapSize
InitializeCriticalSectionEx
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
SetEvent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
lstrcpyW
lstrcpynW
InitializeCriticalSectionAndSpinCount
ExitProcess
SizeofResource
GetCurrentProcess
FreeLibrary
TerminateProcess
GetSystemInfo
CreateToolhelp32Snapshot
Thread32First
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
GetTickCount
GetLocalTime
GlobalFree
GetProcAddress
LocalAlloc
LoadLibraryA
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
FlushFileBuffers
GetCurrentProcessId
GetLastError
GetModuleFileNameW
CreateEventA
GetModuleHandleA
GetSystemTimeAsFileTime
VirtualQuery
LocalFree
CreateFileA
ReadFile
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
SetRect
FillRect
DrawTextW
CharPrevW
GetWindowRgn
UpdateLayeredWindow
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
SetWindowRgn
GetPropW
SetPropW
EnableWindow
GetClassInfoExW
RegisterClassExW
RegisterClassW
CallWindowProcW
DefWindowProcW
InflateRect
LoadCursorW
SetCursor
MonitorFromPoint
GetMonitorInfoW
MonitorFromWindow
LoadImageW
GetWindow
GetParent
CreatePopupMenu
GetWindowLongW
PtInRect
IsRectEmpty
OffsetRect
UnionRect
IntersectRect
MapWindowPoints
ScreenToClient
GetCursorPos
GetClientRect
InvalidateRect
GetUpdateRect
wsprintfW
CharLowerA
DestroyMenu
SendMessageW
PostMessageW
PostQuitMessage
SetTimer
ShowWindow
MessageBoxW
IsZoomed
MoveWindow
GetWindowRect
FindWindowA
LoadIconW
EndPaint
EnableMenuItem
AppendMenuW
TrackPopupMenu
CreateCaret
GetCaretBlinkTime
HideCaret
ShowCaret
SetCaretPos
GetCaretPos
ClientToScreen
IsWindowEnabled
UpdateWindow
GetSysColor
EqualRect
wsprintfA
DrawTextA
SetWindowLongW
MapVirtualKeyExW
GetKeyNameTextW
GetKeyboardLayout
SetForegroundWindow
GetGUIThreadInfo
InvalidateRgn
GetMessageW
TranslateMessage
DispatchMessageW
CreateWindowExW
IsWindow
DestroyWindow
SetWindowPos
IsWindowVisible
IsIconic
CharNextW
SetFocus
GetActiveWindow
GetFocus
GetKeyState
SetCapture
ReleaseCapture
KillTimer
GetDC
ReleaseDC
BeginPaint
CreateAcceleratorTableW
CharUpperBuffW
MessageBoxW
advapi32
RegQueryValueExA
CryptEncrypt
LookupAccountNameW
CryptGetHashParam
ConvertSidToStringSidW
CryptHashData
CryptCreateHash
CryptAcquireContextW
OpenProcessToken
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegQueryInfoKeyA
CryptReleaseContext
CryptDestroyHash
RegOpenKeyExW
CryptImportKey
CryptDestroyKey
CryptAcquireContextA
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
QueryServiceConfigW
OpenServiceW
EnumServicesStatusExW
OpenSCManagerW
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
shell32
ShellExecuteW
SHGetFolderPathW
ShellExecuteExW
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFolderPathA
DragQueryFileW
ole32
ReleaseStgMedium
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
OleLockRunning
OleDuplicateData
CoInitialize
CoCreateGuid
CoCreateInstance
CoUninitialize
DoDragDrop
shlwapi
PathFileExistsW
PathFileExistsA
PathRemoveExtensionW
comctl32
_TrackMouseEvent
InitCommonControlsEx
gdiplus
GdipCreateBitmapFromScan0
GdipCreateHBITMAPFromBitmap
GdipDisposeImage
GdipCloneImage
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipSetPenMode
GdipDeletePen
GdipCreatePen1
GdipCreateSolidFill
GdipDeleteBrush
GdipGetImageGraphicsContext
GdipAddPathArc
GdipAddPathLine
GdipDeletePath
GdipCreatePath
GdipFree
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipCloneBrush
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipSetTextRenderingHint
GdipSetInterpolationMode
GdipDrawRectangleI
GdipDrawPath
GdipFillRectangleI
GdipFillPath
GdipDrawImageRectI
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipDrawString
GdipMeasureString
GdipStringFormatGetGenericTypographic
GdipDeleteStringFormat
GdipCloneStringFormat
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetStringFormatTrimming
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageSelectActiveFrame
GdipImageGetFrameCount
imm32
ImmReleaseContext
ImmSetCompositionWindow
ImmGetContext
wldap32
ws2_32
WSAEventSelect
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
WSACreateEvent
freeaddrinfo
getaddrinfo
WSAIoctl
iphlpapi
GetAdaptersInfo
GetAdaptersAddresses
gdi32
CreateRectRgn
PtInRegion
CreateDIBSection
CombineRgn
SetBkMode
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
GetDIBits
GetTextExtentPoint32W
LineTo
SelectClipRgn
CreateSolidBrush
CreatePatternBrush
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
PlayEnhMetaFile
GetEnhMetaFileHeader
CreateEnhMetaFileW
CloseEnhMetaFile
SelectObject
SaveDC
RestoreDC
Rectangle
RemoveFontMemResourceEx
AddFontMemResourceEx
GetStockObject
MoveToEx
GetDeviceCaps
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateDIBitmap
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
TextOutW
GdiFlush
GetTextExtentPointA
GetBitmapBits
SetTextColor
SetBitmapBits
CreatePenIndirect
ExtSelectClipRgn
SetBkColor
StretchBlt
SetStretchBltMode
GetObjectA
oleaut32
wtsapi32
WTSSendMessageW
Sections
.text Size: 988KB - Virtual size: 988KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.swo0 Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.swo1 Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE