Static task
static1
Behavioral task
behavioral1
Sample
1860d701c212a2802006c6fc7c125aa1943e591ae852b1fe38d09d106e26c298.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1860d701c212a2802006c6fc7c125aa1943e591ae852b1fe38d09d106e26c298.exe
Resource
win10v2004-20230915-en
General
-
Target
1860d701c212a2802006c6fc7c125aa1943e591ae852b1fe38d09d106e26c298
-
Size
928KB
-
MD5
9903d51a7454af92894acd373db9aa16
-
SHA1
0a34c4dbc683eab838672cc4feb0e5388d410a70
-
SHA256
1860d701c212a2802006c6fc7c125aa1943e591ae852b1fe38d09d106e26c298
-
SHA512
a76dc7f7de4f082cc9e6ccb01a57dce34535885549729f4c3b3e62c7c5453ff1616ef687e9995a57671c7e30a4bff0b331dcfcd10862f154c896417971bd5719
-
SSDEEP
24576:Y8ImPTszQUiOrhvRxWtAxSpFpngEPI2TEy:H+hxS1n/1TEy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1860d701c212a2802006c6fc7c125aa1943e591ae852b1fe38d09d106e26c298
Files
-
1860d701c212a2802006c6fc7c125aa1943e591ae852b1fe38d09d106e26c298.exe windows:4 windows x86
7e61547cabc49db739d3b2c5c52fbb4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
Imports
hid
HidD_GetProductString
HidD_GetSerialNumberString
HidD_GetManufacturerString
HidD_GetHidGuid
HidD_GetNumInputBuffers
HidD_SetNumInputBuffers
HidD_GetPreparsedData
HidP_GetCaps
HidP_GetSpecificValueCaps
HidD_GetAttributes
HidD_FreePreparsedData
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
mciSendCommandW
kernel32
FindResourceExW
SizeofResource
LockResource
LoadResource
FindResourceW
InterlockedIncrement
InterlockedDecrement
lstrlenW
CloseHandle
GetProcAddress
LoadLibraryW
OpenProcess
GetTickCount
FreeConsole
VerLanguageNameW
GetLastError
EnumResourceLanguagesW
GetUserDefaultLangID
CreateMutexW
ReleaseMutex
WideCharToMultiByte
WaitForSingleObject
GetModuleFileNameW
GetLocalTime
GetCurrentProcessId
GetCurrentThreadId
OutputDebugStringA
WriteFile
SetEndOfFile
SetFilePointer
CopyFileW
GetFileSize
CreateFileW
GetModuleHandleW
DeleteFileW
GetTempPathW
GetFileAttributesW
MapViewOfFileEx
CreateFileMappingW
UnmapViewOfFile
RaiseException
InitializeCriticalSection
DeleteCriticalSection
OpenMutexW
GetCommandLineW
GetDriveTypeW
SetErrorMode
lstrcpynW
GetStartupInfoW
ExitProcess
CreateEventW
SetEvent
OpenEventW
ResumeThread
MultiByteToWideChar
GetCurrentProcess
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
lstrlenA
DeviceIoControl
GetPrivateProfileStringW
InterlockedExchangeAdd
GetStdHandle
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringW
GetSystemDirectoryW
GetProcessAffinityMask
Sleep
CreateThread
FreeLibrary
FreeResource
GlobalFree
GlobalAlloc
FlushFileBuffers
GetWindowsDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
ResetEvent
SleepEx
ReadFileEx
GetLogicalDriveStringsW
ReadFile
GetStringTypeW
GetStringTypeA
CreateFileA
IsBadCodePtr
GetTimeZoneInformation
DebugBreak
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualFree
HeapCreate
LCMapStringW
LCMapStringA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
SetStdHandle
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
TerminateProcess
TlsAlloc
QueryPerformanceCounter
IsBadReadPtr
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetOEMCP
GetCPInfo
LocalAlloc
LoadLibraryA
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RtlUnwind
ExitThread
GetModuleHandleA
GetSystemTimeAsFileTime
GetModuleFileNameA
user32
SetWindowLongW
GetWindowLongW
PeekMessageW
RegisterWindowMessageW
SendNotifyMessageW
IsWindow
CreateDialogIndirectParamW
ShowWindow
FindWindowExW
RegisterClassW
RegisterDeviceNotificationW
UnregisterDeviceNotification
BroadcastSystemMessageW
FindWindowW
CreateWindowExW
LoadCursorW
RegisterClassExW
DefWindowProcW
DestroyWindow
PostQuitMessage
KillTimer
SendMessageW
SetTimer
GetMessageW
DispatchMessageW
TranslateMessage
UnregisterClassW
MessageBoxW
GetClassNameW
GetWindowTextW
PostMessageW
GetWindowThreadProcessId
UnhookWinEvent
SetWinEventHook
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegEnumKeyExW
RegEnumValueW
RegDeleteKeyW
RegDeleteValueW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ole32
StringFromCLSID
GetRunningObjectTable
CreateClassMoniker
CoInitializeEx
CoTaskMemFree
shlwapi
PathRemoveFileSpecW
UrlEscapeW
PathFindExtensionW
PathIsRootW
Sections
.text Size: 680KB - Virtual size: 677KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 176KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE