Static task
static1
Behavioral task
behavioral1
Sample
698acc267db1302a37e02748859b3c562589291dd288afc48aa9e11aad5a8ad0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
698acc267db1302a37e02748859b3c562589291dd288afc48aa9e11aad5a8ad0.exe
Resource
win10v2004-20230915-en
General
-
Target
698acc267db1302a37e02748859b3c562589291dd288afc48aa9e11aad5a8ad0
-
Size
705KB
-
MD5
09171ba83f466fd472f9943f6a9a1923
-
SHA1
baf31a1873668da3dd716a0ce479230cc336cf75
-
SHA256
698acc267db1302a37e02748859b3c562589291dd288afc48aa9e11aad5a8ad0
-
SHA512
b9a5e7013cdc9505683c1d619e73c9958a400548a8d830f303ba5f5b2bb90eab21682559f18c0d048b5ebce76bf920b233917eac4132551689a935cbc8702194
-
SSDEEP
12288:G2h5IOAk8DDiTyxgPZERLgC8attTDaDBLgC8attTDaD/x:lHxRymhERLz8attTDaDBLz8attTDaD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 698acc267db1302a37e02748859b3c562589291dd288afc48aa9e11aad5a8ad0
Files
-
698acc267db1302a37e02748859b3c562589291dd288afc48aa9e11aad5a8ad0.exe windows:5 windows x86
7bc6a30fe006f12144bcb8c20a85078c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winhttp
WinHttpCrackUrl
WinHttpConnect
WinHttpSetTimeouts
WinHttpSendRequest
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpReceiveResponse
WinHttpOpen
WinHttpReadData
WinHttpQueryDataAvailable
kernel32
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
GetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
Sleep
CloseHandle
CreateMutexW
GetModuleHandleW
SetFileAttributesW
GetFileAttributesW
DeleteFileW
GetEnvironmentVariableA
WriteFile
CreateFileW
DecodePointer
GetProcAddress
VirtualAllocEx
VirtualFreeEx
OpenProcess
GetCurrentProcess
GetCurrentProcessId
RaiseException
ReadProcessMemory
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
TerminateProcess
GetEnvironmentStringsW
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
SetFilePointerEx
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
HeapAlloc
HeapFree
GetACP
GetStdHandle
GetModuleHandleExW
ExitProcess
LoadLibraryExW
FreeLibrary
RtlUnwind
OutputDebugStringW
InitializeSListHead
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
FreeEnvironmentStringsW
GetProcessHeap
SetEndOfFile
SetStdHandle
HeapSize
WriteConsoleW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
CreateEventW
SetLastError
user32
GetMessageW
TranslateMessage
GetWindowThreadProcessId
FindWindowExW
FindWindowW
GetParent
ScreenToClient
GetClientRect
SendMessageTimeoutW
ClientToScreen
GetCursorPos
SetForegroundWindow
TrackPopupMenu
AppendMenuW
DestroyMenu
CreatePopupMenu
GetMenu
LoadImageW
DestroyIcon
SetWindowTextW
FlashWindowEx
SendMessageW
SetWindowLongW
GetWindowLongW
KillTimer
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
PostQuitMessage
DefWindowProcW
PostMessageW
DispatchMessageW
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetSpecialFolderPathW
ShellExecuteA
ShellExecuteW
SHCreateDirectoryExW
Shell_NotifyIconW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoCreateGuid
shlwapi
PathFileExistsW
PathAddBackslashW
PathAppendW
Sections
.text Size: 242KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 370KB - Virtual size: 370KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ