Static task
static1
Behavioral task
behavioral1
Sample
174476b3151a5f8371eb88e479da6fc0ecd1113b9842a3604c537afab29c23ec.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
174476b3151a5f8371eb88e479da6fc0ecd1113b9842a3604c537afab29c23ec.exe
Resource
win10v2004-20230915-en
General
-
Target
174476b3151a5f8371eb88e479da6fc0ecd1113b9842a3604c537afab29c23ec
-
Size
8.4MB
-
MD5
37dcf07f6ff3a2618ffef6b8882e0dc7
-
SHA1
e761b74bd06863507e08a09fe3377488b59ae7f5
-
SHA256
174476b3151a5f8371eb88e479da6fc0ecd1113b9842a3604c537afab29c23ec
-
SHA512
508b2e3adf607565988ceda8b6542e7cb61bab74e55af38edc96396ab507f6e9e2e9fd3971bd06a88f6059578e13f5999d022874a809afa13315cf9aadb52d33
-
SSDEEP
196608:TmMBSDpWtjWGDYf31/3sd46mTy6s8W9jHkO9XkFk:DJqGD+3lcKC1ZkF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 174476b3151a5f8371eb88e479da6fc0ecd1113b9842a3604c537afab29c23ec
Files
-
174476b3151a5f8371eb88e479da6fc0ecd1113b9842a3604c537afab29c23ec.exe windows:5 windows x86
18364a9ca008c95837914fc566a17661
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
GetFileSize
GetFileTime
SystemTimeToFileTime
SetErrorMode
GetCurrentDirectoryA
RtlUnwind
HeapAlloc
GetTimeZoneInformation
HeapFree
RaiseException
HeapReAlloc
GetStartupInfoA
GetCommandLineA
GetACP
HeapSize
SetStdHandle
GetFileType
GetEnvironmentVariableA
TlsGetValue
HeapDestroy
HeapCreate
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadCodePtr
IsValidLocale
IsValidCodePage
LocalReAlloc
EnumSystemLocalesA
GetUserDefaultLCID
SetConsoleCtrlHandler
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
VirtualProtect
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
lstrcmpA
MulDiv
SetLastError
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
AreFileApisANSI
CreateFileW
CreateFileMappingW
CreateMutexW
DeleteFileW
FormatMessageW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetFileAttributesW
GetFileAttributesExW
GetFullPathNameW
GetSystemInfo
GetTempPathW
GlobalFlags
HeapValidate
HeapCompact
LoadLibraryW
LockFileEx
UnlockFileEx
WaitForSingleObjectEx
OutputDebugStringW
GetProcessHeap
InterlockedCompareExchange
FlushViewOfFile
FlushConsoleInputBuffer
QueryPerformanceCounter
GlobalMemoryStatus
GetCurrentProcessId
VirtualQuery
SetFilePointer
ReadFile
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateEventA
GetProcessVersion
lstrcatA
GlobalGetAtomNameA
lstrcmpiA
GlobalFindAtomA
GlobalDeleteAtom
FormatMessageA
InterlockedDecrement
GetFileAttributesA
GetCurrentThreadId
GetSystemTimeAsFileTime
CreateMutexA
CopyFileA
GetTempPathA
GetTempFileNameA
VirtualFree
VirtualProtectEx
WriteProcessMemory
SetThreadContext
GetThreadContext
ReadProcessMemory
VirtualQueryEx
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
VirtualAlloc
Module32First
IsBadWritePtr
MoveFileExA
SetFileAttributesA
CreateProcessA
CreateToolhelp32Snapshot
Process32First
TerminateProcess
Process32Next
TerminateThread
ExitThread
lstrcpyA
PulseEvent
SetEvent
ResetEvent
InterlockedIncrement
GlobalFree
LockResource
LoadLibraryA
LocalAlloc
LocalFree
FreeLibrary
GetTickCount
GlobalSize
GetProcAddress
OpenProcess
WideCharToMultiByte
ResumeThread
WaitForSingleObject
CreateThread
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
SuspendThread
InterlockedExchangeAdd
GetSystemTime
InterlockedExchange
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GlobalAddAtomA
WritePrivateProfileSectionA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
GetPrivateProfileSectionA
OutputDebugStringA
GetLastError
GetModuleHandleA
GetModuleFileNameA
WinExec
Sleep
ExitProcess
FindFirstFileA
FindNextFileA
FindClose
GetLocalTime
CreateFileA
WriteFile
CloseHandle
DeleteFileA
FreeResource
lstrlenA
CreateDirectoryA
IsBadReadPtr
MultiByteToWideChar
FindResourceA
SizeofResource
LoadResource
GlobalAlloc
GlobalLock
GlobalUnlock
GetLocaleInfoA
FlushInstructionCache
GetVersionExA
GetVersionExW
GetVersion
GetCurrentProcess
FreeLibrary
TerminateProcess
GetSystemInfo
CreateToolhelp32Snapshot
Thread32First
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
GetTickCount
GetLocalTime
GlobalFree
GetProcAddress
LocalAlloc
LoadLibraryA
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
FlushFileBuffers
GetCurrentProcessId
GetLastError
GetModuleFileNameW
CreateEventA
GetModuleHandleA
GetSystemTimeAsFileTime
VirtualQuery
LocalFree
CreateFileA
ReadFile
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
GetDlgCtrlID
GetKeyState
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetWindow
OffsetRect
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
ReleaseDC
GetDC
GetClientRect
GetSystemMetrics
GetDesktopWindow
IsWindow
wsprintfA
RegisterWindowMessageA
SetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
PtInRect
SetDlgItemTextA
SetWindowsHookExA
WindowFromPoint
GetParent
GetDlgItem
ScreenToClient
ClientToScreen
IsIconic
DrawIcon
GetSystemMenu
SetScrollInfo
GetScrollInfo
CopyRect
EqualRect
AdjustWindowRectEx
GetSysColor
InsertMenuA
AppendMenuA
CreatePopupMenu
IsWindowVisible
GetForegroundWindow
LoadKeyboardLayoutA
FindWindowA
FindWindowExA
EnumWindows
EnableWindow
InvalidateRect
PostMessageA
SendMessageA
SetWindowTextA
MessageBoxA
GetCursorPos
CallNextHookEx
GetKeyNameTextA
MapVirtualKeyA
GetWindowRect
RegisterHotKey
UnregisterHotKey
UnhookWindowsHookEx
DispatchMessageA
UnregisterClassA
GetProcessWindowStation
GetUserObjectInformationW
GetUpdateRect
GetDlgItemInt
SetDlgItemInt
IsDialogMessageA
MoveWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
ValidateRect
CharUpperA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
InflateRect
DestroyMenu
LoadStringA
GetSysColorBrush
GetWindowInfo
GetWindowRgn
IsZoomed
SetTimer
MenuItemFromPoint
GetMenuItemRect
GetComboBoxInfo
TrackMouseEvent
DrawStateA
DestroyIcon
KillTimer
GetIconInfo
MapWindowPoints
ShowScrollBar
SendDlgItemMessageA
DrawIconEx
IsRectEmpty
SetWindowRgn
WindowFromDC
EnableScrollBar
GetScrollBarInfo
GetDCEx
GetWindowLongW
SetWindowLongW
IsMenu
GetMenuItemInfoA
SetMenuItemInfoA
EnumThreadWindows
SetRect
TranslateMessage
PeekMessageA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
IsClipboardFormatAvailable
SetWindowLongA
GetWindowLongA
GetSubMenu
LoadMenuA
SetFocus
GetFocus
GetWindowTextA
GetWindowTextLengthA
GetMessageA
UpdateWindow
ShowWindow
SetForegroundWindow
SetWindowPos
CreateWindowExA
RegisterClassExA
LoadCursorA
GetClassInfoExA
DefWindowProcA
PostQuitMessage
DestroyWindow
LoadIconA
SetCursor
ReleaseCapture
SetCapture
GetAsyncKeyState
GetClassNameA
EnumChildWindows
SetRectEmpty
SetMenu
SetCursorPos
CharUpperBuffW
MessageBoxW
gdi32
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
GetClipRgn
SelectClipPath
CreatePen
SetViewportExtEx
CreateSolidBrush
CreatePatternBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CombineRgn
GetTextExtentPoint32A
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
GetStockObject
RestoreDC
SaveDC
PatBlt
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
GetMapMode
GetBkColor
CreateRectRgn
SetDIBitsToDevice
CreateCompatibleDC
CreateDIBSection
GetPixel
ExtCreateRegion
ExtTextOutW
GetTextColor
OffsetRgn
PtInRegion
EndPath
Rectangle
BeginPath
StretchBlt
CreateRoundRectRgn
GetTextExtentPointA
SetPixel
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
GetDIBits
CreateFontIndirectA
DeleteObject
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
EqualSid
AllocateAndInitializeSid
RegisterEventSourceA
ReportEventA
DeregisterEventSource
GetTokenInformation
OpenProcessToken
OpenThreadToken
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
FreeSid
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
QueryServiceConfigW
OpenServiceW
EnumServicesStatusExW
OpenSCManagerW
shell32
SHChangeNotify
SHFileOperationA
DragAcceptFiles
DragQueryFileA
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteA
comctl32
ord17
ImageList_Destroy
ImageList_GetIcon
ImageList_GetIconSize
ImageList_GetImageInfo
ImageList_Draw
ole32
CoInitialize
CoCreateInstance
CoUninitialize
CreateStreamOnHGlobal
oleaut32
SysAllocStringLen
SysFreeString
urlmon
URLDownloadToFileA
shlwapi
PathIsDirectoryA
PathFileExistsA
gdiplus
GdipCreateBitmapFromFile
GdipAlloc
GdipFree
GdipImageRotateFlip
GdipGetImageHeight
GdipGetImageWidth
GdiplusShutdown
GdipCreateBitmapFromStreamICM
GdipLoadImageFromFileICM
GdipCreateBitmapFromFileICM
GdipSaveImageToFile
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCreateFromHDC
GdipDeleteGraphics
GdipLoadImageFromStreamICM
GdipDisposeImage
GdipCloneImage
GdipLoadImageFromStream
GdipCreateBitmapFromStream
GdipReleaseDC
GdipDrawImageRectI
GdiplusStartup
GdipLoadImageFromFile
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetCheckConnectionA
InternetOpenA
InternetCloseHandle
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
winhttp
WinHttpSendRequest
WinHttpQueryOption
WinHttpSetOption
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpConnect
WinHttpSetTimeouts
WinHttpOpen
WinHttpCrackUrl
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpReadData
psapi
GetModuleFileNameExA
winmm
timeKillEvent
timeSetEvent
timeGetTime
msimg32
TransparentBlt
msvfw32
DrawDibOpen
DrawDibDraw
wtsapi32
WTSSendMessageW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT0 Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT1 Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE