Static task
static1
Behavioral task
behavioral1
Sample
85b9e84512c1f89b8c43f4a377d4ca3b497de54976a477d56e9dd30a50274622.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
85b9e84512c1f89b8c43f4a377d4ca3b497de54976a477d56e9dd30a50274622.exe
Resource
win10v2004-20230915-en
General
-
Target
85b9e84512c1f89b8c43f4a377d4ca3b497de54976a477d56e9dd30a50274622
-
Size
506KB
-
MD5
4cce638ce87addba74652f16fce0b08d
-
SHA1
45bc990f44080fb51f710c1346eef9351fe935b3
-
SHA256
85b9e84512c1f89b8c43f4a377d4ca3b497de54976a477d56e9dd30a50274622
-
SHA512
12beed9702b1eac3af4275534230e2b4ae6cbfc16a18b2f721726f439e0718f695216561d8f3a972d54a780befba0b02a68dffe6333f2d274298099578a1a0aa
-
SSDEEP
12288:j7vOYXchMm78TDXX+cZWuLcjNb9GI8X4KLnZrmDC74y6YD9FcImxm8gH53kEPfL:isXHX47cLnHZL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85b9e84512c1f89b8c43f4a377d4ca3b497de54976a477d56e9dd30a50274622
Files
-
85b9e84512c1f89b8c43f4a377d4ca3b497de54976a477d56e9dd30a50274622.exe windows:5 windows x86
b9198494e459dacfef8972a151fb67f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
sndPlaySoundW
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInterfaceDetailW
SetupDiGetClassDevsW
SetupDiEnumDeviceInterfaces
avifil32
AVIStreamWrite
AVIStreamSetFormat
AVIMakeCompressedStream
AVIFileInit
AVIFileOpenW
AVIFileExit
AVIStreamRelease
AVIFileRelease
AVIFileCreateStreamW
mfc100u
ord2614
ord266
ord4331
ord13415
ord2057
ord11330
ord13396
ord11353
ord2823
ord8346
ord11210
ord2418
ord12610
ord5558
ord6036
ord13220
ord4151
ord9328
ord5468
ord5846
ord970
ord12951
ord341
ord919
ord11997
ord13047
ord3436
ord2617
ord7901
ord3749
ord2748
ord8266
ord5809
ord921
ord5227
ord6344
ord381
ord3763
ord2844
ord8273
ord6117
ord1266
ord3746
ord2746
ord5802
ord917
ord3260
ord3261
ord3368
ord3372
ord3367
ord6711
ord13305
ord1476
ord3380
ord1313
ord8179
ord4512
ord4478
ord285
ord5264
ord2629
ord1477
ord1311
ord261
ord7871
ord268
ord9447
ord6869
ord890
ord1292
ord7176
ord1895
ord12753
ord1274
ord1911
ord4086
ord6140
ord5118
ord11845
ord11209
ord11240
ord9498
ord7391
ord11236
ord11228
ord5261
ord3416
ord13568
ord13571
ord13569
ord13572
ord13567
ord13570
ord7179
ord11469
ord13267
ord10976
ord14162
ord1739
ord7126
ord11864
ord3625
ord3684
ord8530
ord13387
ord7108
ord13381
ord11477
ord11476
ord2164
ord4744
ord13854
ord11784
ord7548
ord7624
ord3766
ord2946
ord2847
ord8276
ord5456
ord6125
ord1905
ord3248
ord4359
ord7249
ord10081
ord8599
ord5828
ord10058
ord2528
ord12821
ord3428
ord421
ord979
ord10960
ord13398
ord2939
ord2824
ord6086
ord1226
ord3257
ord7876
ord13168
ord13213
ord3373
ord1986
ord3361
ord11999
ord8347
ord9333
ord7393
ord4792
ord6922
ord6932
ord6931
ord4623
ord4794
ord4645
ord5143
ord4901
ord8483
ord5115
ord4923
ord4642
ord2951
ord2952
ord11116
ord2339
ord5276
ord12557
ord10725
ord6156
ord13388
ord7109
ord13382
ord2665
ord3992
ord14067
ord3999
ord4416
ord4383
ord4379
ord4413
ord4434
ord4392
ord4421
ord4430
ord4400
ord4404
ord4408
ord4396
ord4425
ord4388
ord1519
ord1512
ord1514
ord1508
ord1501
ord11244
ord11246
ord12724
ord2853
ord8393
ord10045
ord6247
ord11163
ord8112
ord13380
ord10937
ord3402
ord11081
ord8277
ord14060
ord14059
ord14132
ord14149
ord14145
ord14147
ord14148
ord14146
ord2417
ord7385
ord2884
ord2887
ord12606
ord5556
ord2756
ord2980
ord2981
ord3627
ord9525
ord10412
ord11123
ord948
ord7006
ord7618
ord290
ord1479
ord3397
ord1212
ord788
ord6870
ord265
ord11159
ord2852
ord7973
ord4360
ord3491
ord1990
ord897
ord11982
ord2184
ord2064
ord5799
ord945
ord374
ord7524
ord1310
ord280
ord2062
ord1934
ord7529
ord7967
ord11998
ord4356
ord6080
ord12186
ord286
ord2185
ord5862
ord1300
ord1312
ord2089
ord3446
ord4290
ord1987
ord1298
ord296
ord902
ord3846
ord8264
msvcr100
_onexit
__CxxFrameHandler3
?terminate@@YAXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
_lock
_amsg_exit
strtod
wcstod
strstr
feof
free
fseek
fread
printf
wcsncmp
memmove_s
memcpy_s
wcstol
strtol
fgets
fclose
_wfopen
__dllonexit
__wgetmainargs
_unlock
memset
memcpy
_CIsqrt
_CxxThrowException
malloc
kernel32
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
DecodePointer
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
PurgeComm
WriteFile
SetCommTimeouts
GetCommTimeouts
SetCommState
GetCommState
GetLocalTime
Sleep
CreateThread
IsProcessorFeaturePresent
UnhandledExceptionFilter
IsDebuggerPresent
lstrcpynW
CloseHandle
ReadFile
GetLocaleInfoW
CreateFileW
GetTickCount
LoadLibraryW
GetLastError
GetVersionExW
user32
GetParent
KillTimer
GetCursorPos
ScreenToClient
GetClientRect
InvalidateRect
GetSystemMetrics
PtInRect
SetTimer
EnableWindow
CopyRect
DrawFrameControl
CallWindowProcA
GetWindowLongW
CallWindowProcW
SetWindowLongW
DrawFocusRect
LoadIconW
GetSystemMenu
AppendMenuW
IsIconic
DrawIcon
SetRect
LoadCursorW
SetCursor
DrawTextW
GetSysColor
SendMessageW
gdi32
GetObjectW
CreatePen
TextOutW
ExtTextOutW
GetTextMetricsW
SetBkColor
CreateCompatibleDC
Rectangle
GetStockObject
StretchBlt
SetBitmapBits
CreateDIBSection
DeleteObject
SetTextColor
comdlg32
GetOpenFileNameW
advapi32
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
comctl32
InitCommonControlsEx
ole32
CoUninitialize
CoInitializeEx
CoTaskMemFree
CoCreateInstance
oleaut32
VariantInit
VariantClear
Sections
.text Size: 357KB - Virtual size: 357KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ