Static task
static1
Behavioral task
behavioral1
Sample
624371f73f78f19e658f856ed2e1db6a8d62e3f720691390a7e38b29f1bb25bc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
624371f73f78f19e658f856ed2e1db6a8d62e3f720691390a7e38b29f1bb25bc.exe
Resource
win10v2004-20230915-en
General
-
Target
624371f73f78f19e658f856ed2e1db6a8d62e3f720691390a7e38b29f1bb25bc
-
Size
200KB
-
MD5
367720541b1708c4ced42fd6d93d62bf
-
SHA1
a259e90915302444a94328e38cdf51cddb8db66b
-
SHA256
624371f73f78f19e658f856ed2e1db6a8d62e3f720691390a7e38b29f1bb25bc
-
SHA512
56de59e7c00149dadc92554a0acc0e80c0d1488942c5158724c31eb9d5b76d40a3c8c8ed77a442d41b8a1fc7614e8cd6345082d478f60b3efedc27ad93922110
-
SSDEEP
3072:VeBvowATXK26dkn0XaOShee5eFiFD2I1Bz55douVz8IR/7flI:VmATXKJdkSaOXe5MgLzN8IRb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 624371f73f78f19e658f856ed2e1db6a8d62e3f720691390a7e38b29f1bb25bc
Files
-
624371f73f78f19e658f856ed2e1db6a8d62e3f720691390a7e38b29f1bb25bc.exe windows:4 windows x86
60d611cb4f3da751076778046e94b30a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
imagehlp
MakeSureDirectoryPathExists
wininet
InternetCombineUrlA
InternetCrackUrlA
kernel32
WritePrivateProfileStringA
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
GetTimeZoneInformation
TerminateProcess
HeapReAlloc
HeapSize
GetACP
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SizeofResource
GlobalFlags
GlobalAlloc
lstrcmpA
GetCurrentThread
LocalFree
MulDiv
SetLastError
GetFileTime
GetProfileStringA
lstrcatA
lstrcpyA
lstrlenA
FreeLibrary
LoadLibraryA
GetWindowsDirectoryA
GetProcAddress
CloseHandle
OpenProcess
GetCurrentThreadId
GetLastError
lstrcmpiA
MultiByteToWideChar
Sleep
lstrcpynA
WinExec
GetModuleHandleA
GetVersionExA
GetCurrentDirectoryA
CreateDirectoryA
LoadResource
FindResourceA
LockResource
GlobalFree
GlobalUnlock
GlobalLock
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
GetModuleFileNameA
DuplicateHandle
GetCurrentProcess
CreateFileA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSize
SetErrorMode
user32
BeginPaint
GetMessageA
ValidateRect
CharUpperA
GetCursorPos
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
IsDialogMessageA
PostMessageA
SendDlgItemMessageA
MapWindowPoints
GetFocus
AdjustWindowRectEx
LoadStringA
MessageBoxA
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetDlgCtrlID
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetForegroundWindow
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindowEnabled
DrawTextExA
ClientToScreen
SetWindowTextA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
ScreenToClient
CreateWindowExA
GetDlgItem
GetWindowTextA
EndDialog
SetFocus
GetWindowLongA
DestroyIcon
DrawIcon
LoadImageA
LoadIconA
DestroyMenu
GetSysColorBrush
GrayStringA
DrawTextA
TabbedTextOutA
GetTopWindow
EndPaint
ShowWindow
UpdateWindow
GetLastActivePopup
SetForegroundWindow
SetWindowPos
GetDC
InflateRect
InvalidateRect
MessageBeep
DestroyCursor
CharNextA
IsWindowUnicode
GetSysColor
IsWindow
RegisterWindowMessageA
SendMessageTimeoutA
EnumChildWindows
GetClassNameA
WindowFromPoint
GetParent
GetWindow
IsWindowVisible
IsIconic
CopyRect
GetMessagePos
GetWindowThreadProcessId
GetKeyState
GetWindowRect
GetWindowDC
GetSystemMetrics
ReleaseDC
PeekMessageA
TranslateMessage
DispatchMessageA
PostQuitMessage
LoadCursorA
CopyIcon
SetWindowLongA
SetCursor
GetClientRect
PtInRect
SetCapture
ReleaseCapture
RedrawWindow
SendMessageA
EnableWindow
GetCapture
gdi32
BitBlt
CreateCompatibleDC
RestoreDC
CreateDIBitmap
GetTextExtentPointA
PatBlt
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateSolidBrush
GetDeviceCaps
IntersectClipRect
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
DeleteDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
SaveDC
SetROP2
CreatePen
SelectObject
GetStockObject
Rectangle
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
shell32
SHGetMalloc
SHGetDesktopFolder
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
SHGetFileInfoA
comctl32
ord17
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
VariantClear
SafeArrayDestroy
SafeArrayAccessData
SysAllocStringLen
SafeArrayCreateVector
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ