Static task
static1
Behavioral task
behavioral1
Sample
8f9aafd0fb9ed274e4d5ae72dc92a455e32eb586996db144ff49611c8a9af7ef.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8f9aafd0fb9ed274e4d5ae72dc92a455e32eb586996db144ff49611c8a9af7ef.exe
Resource
win10v2004-20230915-en
General
-
Target
8f9aafd0fb9ed274e4d5ae72dc92a455e32eb586996db144ff49611c8a9af7ef
-
Size
573KB
-
MD5
52c53350dbcdcc37133f2c839677525e
-
SHA1
c3a8a6acdf60ebf8a5d1410aa6bf99d139c5bba7
-
SHA256
8f9aafd0fb9ed274e4d5ae72dc92a455e32eb586996db144ff49611c8a9af7ef
-
SHA512
c831931d35670e1d8d429b4b0b8a84de4577c37ed16cc311916296923bde6feae3c806c984817fff95e1ae9e0df18eef4f8797061334eb97ed362ac43caec99e
-
SSDEEP
12288:7oBPE03fgzlREbortC0ZXAqveKmSSbqPr6:7gscQr6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8f9aafd0fb9ed274e4d5ae72dc92a455e32eb586996db144ff49611c8a9af7ef
Files
-
8f9aafd0fb9ed274e4d5ae72dc92a455e32eb586996db144ff49611c8a9af7ef.exe windows:5 windows x86
c53de0fb81274ebc04a1ffc7166d0e33
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
AllocateAndInitializeSid
CopySid
EqualSid
FreeSid
GetLengthSid
GetTokenInformation
LookupAccountSidW
OpenProcessToken
GetSecurityInfo
AdjustTokenPrivileges
LookupPrivilegeValueW
GetUserNameW
RegCreateKeyExW
RegSetValueExW
user32
EnableWindow
DialogBoxParamW
CheckDlgButton
LoadIconW
EndDialog
GetDlgItem
IsDlgButtonChecked
MessageBoxW
GetWindowThreadProcessId
CascadeWindows
CheckMenuRadioItem
DestroyMenu
EnableMenuItem
EndTask
EnumDisplaySettingsW
EnumWindows
GetClassLongW
GetClientRect
GetCursorPos
GetKeyState
GetMenu
GetMessageW
LoadBitmapW
DestroyIcon
CreateIconIndirect
TranslateMessage
TrackPopupMenuEx
ShowWindow
SetTimer
SetForegroundWindow
SetFocus
PostMessageW
PeekMessageW
OpenIcon
MoveWindow
ModifyMenuW
KillTimer
IsZoomed
InsertMenuW
GetWindowPlacement
GetMenuStringW
GetMenuItemCount
FindWindowW
DrawMenuBar
DispatchMessageW
DeleteMenu
DefWindowProcW
CreatePopupMenu
CreateDialogParamW
BringWindowToTop
AppendMenuW
LockWorkStation
ExitWindowsEx
RemoveMenu
CharUpperW
GetGuiResources
GetMenuState
CheckMenuItem
ReleaseDC
GetSystemMetrics
GetDC
FillRect
InflateRect
EndPaint
DrawTextW
CallWindowProcW
BeginPaint
wsprintfW
TrackPopupMenu
TileWindows
SwitchToThisWindow
ShowWindowAsync
SetWindowTextW
SetWindowPos
SetWindowLongW
SetMenuDefaultItem
SendMessageW
SendMessageTimeoutW
PostThreadMessageW
MapWindowPoints
LoadMenuW
IsWindowVisible
IsWindow
InvalidateRect
GetWindowTextW
GetWindowRect
GetWindow
GetWindowLongW
GetSubMenu
LoadStringW
GetParent
gdi32
ExtTextOutW
SaveDC
RestoreDC
ExcludeClipRect
SetBkColor
MoveToEx
LineTo
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
SetTextColor
SelectObject
GetStockObject
shell32
ShellExecuteW
ShellExecuteExW
Shell_NotifyIconW
ShellAboutW
shlwapi
StrFormatByteSizeW
comctl32
CreateStatusWindowW
InitCommonControls
ImageList_Remove
ImageList_ReplaceIcon
ImageList_Create
msvcrt
_wcsicmp
wcsncpy
wcslen
wcscpy
wcscmp
labs
__lconv_init
memcpy
signal
_ftol
_wcmdln
__winitenv
_initterm
_fpreset
_cexit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__setusermatherr
malloc
wcschr
_snwprintf
_wcsnicmp
memset
wcsstr
_vsnwprintf
_ultow
kernel32
CloseHandle
GetProcessAffinityMask
OpenProcess
SetProcessAffinityMask
CreateThread
GetModuleHandleW
TlsGetValue
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
Sleep
SetUnhandledExceptionFilter
GetStartupInfoW
WaitForSingleObject
SetProcessShutdownParameters
lstrlenW
LoadLibraryA
GetExitCodeThread
GetCurrentProcessId
FormatMessageW
CreateMutexW
GetLastError
GetCurrentProcess
LoadLibraryW
FreeLibrary
GetNumberFormatW
GetLocaleInfoW
QueryDosDeviceW
GetSystemInfo
GetSystemDirectoryW
GetPriorityClass
GetExitCodeProcess
SetPriorityClass
ReadProcessMemory
LocalFree
LeaveCriticalSection
InitializeCriticalSection
GetProcessIoCounters
EnterCriticalSection
DeleteCriticalSection
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
TerminateProcess
CreateProcessW
CreateEventW
GetProcAddress
HeapAlloc
GetProcessHeap
HeapFree
ntdll
NtQueryInformationProcess
_allmul
NtQuerySystemInformation
_allrem
NtShutdownSystem
NtSetSystemPowerState
RtlNtStatusToDosError
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 503KB - Virtual size: 503KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ