Static task
static1
Behavioral task
behavioral1
Sample
fa3a9ae0449e2cc4eb6dace4f6bab75fcb4e9b82347d860514ff34063a70d55b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fa3a9ae0449e2cc4eb6dace4f6bab75fcb4e9b82347d860514ff34063a70d55b.exe
Resource
win10v2004-20230915-en
General
-
Target
fa3a9ae0449e2cc4eb6dace4f6bab75fcb4e9b82347d860514ff34063a70d55b
-
Size
4.8MB
-
MD5
e93d907cae83c1f3a1d721f09835a7ef
-
SHA1
4e1ea64540f3ee1de2b62356b0a19a7f3f94a0cb
-
SHA256
fa3a9ae0449e2cc4eb6dace4f6bab75fcb4e9b82347d860514ff34063a70d55b
-
SHA512
4c6da4684fbba350b7b2504bd1acffd9bb39efb6091cd6326bbd2579868da7cde8c4fe746724eed02d82ce998c9a6b993dbfb54e914bd5604b363b9416a3314b
-
SSDEEP
98304:DtWHJOc0fbD5nSSyqIW++Cbc0vpcyBd6Mb6w/5b5l4bXJFbJ:DS6X4SyqIz+CEyBd6Mbf/5mXJRJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa3a9ae0449e2cc4eb6dace4f6bab75fcb4e9b82347d860514ff34063a70d55b
Files
-
fa3a9ae0449e2cc4eb6dace4f6bab75fcb4e9b82347d860514ff34063a70d55b.exe windows:5 windows x86
22f495ab51779e8e85af09ed29131bcd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
SetErrorMode
WritePrivateProfileStringW
GlobalFlags
GetStartupInfoW
HeapAlloc
HeapFree
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
TlsFree
GetTickCount
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LCMapStringW
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CreateFileA
SetEnvironmentVariableA
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
InterlockedDecrement
GetModuleHandleA
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GlobalAddAtomW
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
lstrcmpW
GetFileTime
GetFileSizeEx
GetFileAttributesExW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
MoveFileW
FormatMessageW
FreeResource
GlobalUnlock
GlobalLock
DeleteFileW
DeviceIoControl
FindClose
QueryPerformanceCounter
LocalFree
GlobalFree
GlobalAlloc
FindNextFileW
GetFileAttributesW
FindFirstFileW
CreateDirectoryW
GetWindowsDirectoryW
GetSystemTimeAsFileTime
GetVersionExW
GetModuleHandleW
GetModuleFileNameW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
SetLastError
ReadFile
WriteFile
CreateFileW
GetCurrentProcess
CreateProcessW
GetExitCodeProcess
GetProcessId
GetSystemWindowsDirectoryW
GetPrivateProfileStringW
TerminateProcess
OpenProcess
GetCurrentThreadId
GetCommandLineW
GetLastError
CreateMutexW
MultiByteToWideChar
GetDiskFreeSpaceExW
RemoveDirectoryW
SetCurrentDirectoryW
Sleep
GetTempPathW
CreateThread
WaitForSingleObject
WideCharToMultiByte
GetCurrentProcessId
ProcessIdToSessionId
lstrlenW
OutputDebugStringW
FreeLibrary
GetProcAddress
LoadLibraryW
FindResourceW
LoadResource
LockResource
SizeofResource
VirtualFree
CloseHandle
user32
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
ScreenToClient
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
CopyRect
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
GetKeyState
PeekMessageW
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetCapture
GetParent
ModifyMenuW
EnableMenuItem
CheckMenuItem
PostQuitMessage
CharUpperW
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
EnableWindow
GetCursorPos
SetLayeredWindowAttributes
RedrawWindow
ReleaseDC
SetWindowRgn
GetClientRect
SetTimer
MessageBoxW
GetSystemMetrics
PostMessageW
KillTimer
DisableProcessWindowsGhosting
SendMessageW
LoadIconW
SystemParametersInfoW
PtInRect
GetWindowRect
GetWindowPlacement
GetWindow
LoadCursorW
SetCursor
GetClassNameW
IsWindowVisible
GetWindowTextW
SetForegroundWindow
AttachThreadInput
GetWindowThreadProcessId
GetForegroundWindow
SwitchToThisWindow
ShowWindow
IsWindow
FindWindowW
GetFocus
UnregisterClassW
DestroyMenu
GetSysColorBrush
MoveWindow
SetWindowTextW
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
LoadBitmapW
WinHelpW
gdi32
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
DeleteObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
CreateRoundRectRgn
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegQueryValueW
RegOpenKeyW
CreateWellKnownSid
DuplicateToken
CheckTokenMembership
GetTokenInformation
DuplicateTokenEx
OpenProcessToken
CreateProcessAsUserW
RegSetValueExW
RegEnumKeyW
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegDeleteKeyW
RegFlushKey
RegCreateKeyExW
RegCloseKey
RegOpenCurrentUser
RevertToSelf
ImpersonateLoggedOnUser
shell32
ShellExecuteExW
SHGetFolderPathW
SHFileOperationW
SHCreateDirectoryExW
shlwapi
PathAppendW
PathFileExistsW
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathFindExtensionW
ole32
CreateStreamOnHGlobal
oleaut32
VariantChangeType
VariantClear
VariantInit
gdiplus
GdipLoadImageFromStream
GdipDisposeImage
GdipLoadImageFromStreamICM
GdipFree
GdipAlloc
GdipDeleteFontFamily
GdiplusStartup
GdiplusShutdown
GdipCreateFromHDC
GdipDeleteGraphics
GdipDrawImageRectI
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
wtsapi32
WTSQueryUserToken
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 197KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 202KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ