Static task
static1
Behavioral task
behavioral1
Sample
cf66760369930bbcc2a5fa46247898343ed367b1f9ad390fd1225aeffd1fc97d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cf66760369930bbcc2a5fa46247898343ed367b1f9ad390fd1225aeffd1fc97d.exe
Resource
win10v2004-20230915-en
General
-
Target
cf66760369930bbcc2a5fa46247898343ed367b1f9ad390fd1225aeffd1fc97d
-
Size
12.8MB
-
MD5
809b531fdf66fa000b6702610a70070e
-
SHA1
146eebb23f3d13e93002d56bc6824565b6511493
-
SHA256
cf66760369930bbcc2a5fa46247898343ed367b1f9ad390fd1225aeffd1fc97d
-
SHA512
9ce91ecdd540327215d4538afcbf4356dcb6f300275019a091b09267ce15404082db5f446c444c2990f2268e07fa267f054861e40db15eae72a4ae6447942f0e
-
SSDEEP
98304:7R+gCqDcy0L7n4hB8M2ByaSaJE3lWTmf5jRm9uALfprsQJtXkRFEZp:7YD48Sa5sWuAdttXkOp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf66760369930bbcc2a5fa46247898343ed367b1f9ad390fd1225aeffd1fc97d
Files
-
cf66760369930bbcc2a5fa46247898343ed367b1f9ad390fd1225aeffd1fc97d.exe windows:4 windows x86
512495c9aeb6c57bc82ab391169fcc7d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
ExitProcess
GetProcessHeap
VirtualAlloc
GetModuleFileNameA
HeapReAlloc
VirtualProtectEx
WideCharToMultiByte
LocalAlloc
lstrlenW
HeapFree
LocalSize
CloseHandle
IsBadReadPtr
WriteFile
CreateFileA
ReadFile
GetFileSize
GetTickCount
GetTempPathA
Sleep
GetLocalTime
GetCurrentDirectoryA
FreeLibrary
LoadLibraryA
LCMapStringA
FlushFileBuffers
MapViewOfFile
LCMapStringW
IsBadCodePtr
SetUnhandledExceptionFilter
GetCommandLineA
GetVersion
RtlUnwind
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
IsBadWritePtr
CreateFileMappingA
MultiByteToWideChar
GetProcAddress
LoadLibraryW
GlobalFree
GlobalUnlock
RaiseException
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
GetModuleHandleA
SetStdHandle
RtlMoveMemory
LocalFree
GlobalAlloc
GlobalLock
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
VirtualProtect
InterlockedExchange
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
VirtualFree
VirtualQuery
GetSystemInfo
HeapCreate
InterlockedCompareExchange
HeapDestroy
GetEnvironmentVariableA
CloseHandle
WaitForSingleObject
GetTickCount
GetCommandLineA
MulDiv
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
CreateDirectoryA
DeleteFileA
GetFileAttributesA
SetFileAttributesA
FindClose
FindFirstFileA
GetTempPathA
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
CreateEventA
CreateThread
GetPrivateProfileStringA
WritePrivateProfileStringA
GetVersionExA
GetLastError
LoadLibraryA
FreeLibrary
GetFullPathNameA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
lstrlenA
lstrcatA
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
ExitProcess
GetCurrentThreadId
GetModuleFileNameA
LockResource
LoadResource
FindResourceA
SetEvent
CreateFileA
WaitForMultipleObjects
ReadFile
WriteFile
GetProfileStringA
GetUserDefaultLCID
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
ResumeThread
CreateSemaphoreA
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFilePointer
GetFileSize
GetCurrentProcess
TerminateProcess
GetWindowsDirectoryA
GetSystemDirectoryA
MultiByteToWideChar
SetLastError
GetTimeZoneInformation
GetVersion
WideCharToMultiByte
TerminateThread
CreateMutexA
ReleaseMutex
SuspendThread
InterlockedIncrement
InterlockedDecrement
LocalFree
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcpynA
DuplicateHandle
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetStringTypeExA
lstrcmpiA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcmpA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
TlsSetValue
LocalReAlloc
TlsGetValue
GetFileTime
GetCurrentThread
GlobalFlags
SetErrorMode
GetProcessVersion
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
GetSystemTime
GetLocalTime
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
user32
EnumWindows
GetClassNameA
GetWindowLongA
GetWindowRect
GetDC
UpdateLayeredWindow
ReleaseDC
IsWindow
CallWindowProcA
TrackMouseEvent
ShowWindow
EnumChildWindows
GetCursorPos
GetClipboardData
GetMessageA
TranslateMessage
DispatchMessageA
OpenClipboard
GetSystemMetrics
GetPropA
SetPropA
CreateWindowExA
PeekMessageA
MessageBoxA
SendMessageA
CloseClipboard
GetAncestor
wsprintfA
OffsetRect
PtInRect
DestroyIcon
IntersectRect
InflateRect
SetRect
SetScrollPos
SetScrollRange
GetScrollRange
SetCapture
GetCapture
ReleaseCapture
SetTimer
KillTimer
WinHelpA
LoadBitmapA
CopyRect
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
SetWindowRgn
DestroyAcceleratorTable
GetWindow
GetActiveWindow
SetFocus
IsIconic
PeekMessageA
SetMenu
GetMenu
DeleteMenu
GetSystemMenu
DefWindowProcA
GetClassInfoA
IsZoomed
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
TranslateAcceleratorA
IsWindowEnabled
ShowWindow
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
GetSubMenu
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
GetMessageA
WindowFromPoint
DrawFocusRect
DrawEdge
DrawFrameControl
LoadIconA
TranslateMessage
GetWindowRect
GetDesktopWindow
GetClassNameA
GetDlgItem
FindWindowExA
GetWindowTextA
GetNextDlgTabItem
FrameRect
DrawStateA
GetForegroundWindow
GetWindowTextLengthA
CharUpperA
GetWindowDC
IsWindowVisible
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
SetWindowTextA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
LoadStringA
GetSysColorBrush
EnableWindow
RedrawWindow
GetWindowLongA
SetWindowLongA
GetSysColor
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
GetFocus
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBoxA
GetCursorPos
GetSystemMetrics
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
SetActiveWindow
SetCursorPos
UnregisterClassA
SetCursor
GetDC
FillRect
IsRectEmpty
ReleaseDC
IsChild
DestroyMenu
BeginPaint
SetForegroundWindow
LoadCursorA
gdi32
CreateCompatibleDC
SelectObject
DeleteDC
DeleteObject
CreateDIBSection
BitBlt
GetPixel
CreateCompatibleDC
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
GetTextExtentPoint32A
GetDeviceCaps
GetWindowOrgEx
GetWindowExtEx
GetDIBits
StartPage
SelectPalette
StretchBlt
CreatePalette
GetSystemPaletteEntries
CreateDIBitmap
DeleteObject
CreateDCA
CreateCompatibleBitmap
GetPolyFillMode
GetStretchBltMode
GetROP2
GetBkColor
GetBkMode
GetTextColor
CreateRoundRectRgn
CreateEllipticRgn
PathToRegion
EndPath
BeginPath
StartDocA
DeleteDC
EndDoc
EndPage
CreateFontIndirectA
GetStockObject
CreateSolidBrush
FillRgn
CreateRectRgn
CombineRgn
PatBlt
CreatePen
GetObjectA
SelectObject
CreatePatternBrush
CreateBitmap
RealizePalette
SelectClipRgn
CreatePolygonRgn
GetTextMetricsA
Escape
ExtTextOutA
RectVisible
PtVisible
GetViewportExtEx
ExtSelectClipRgn
GetClipRgn
SetStretchBltMode
ExtCreateRegion
SetPixel
CreateDIBSection
CreateRectRgnIndirect
SetBkColor
LineTo
MoveToEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetROP2
SetPolyFillMode
RestoreDC
SaveDC
SetDIBitsToDevice
SetTextColor
SetBkMode
TextOutA
GetViewportOrgEx
gdiplus
GdiplusStartup
GdipSetSolidFillColor
GdipCreateSolidFill
GdipDeleteBrush
GdipDisposeImage
GdipGetRegionBounds
GdipLoadImageFromFile
GdipLoadImageFromStream
GdipDrawRectangleI
GdipGetImageWidth
GdipGetImageHeight
GdipSetSmoothingMode
GdipDeletePen
GdipCreateBitmapFromScan0
GdipCreateFromHDC
GdipSetTextRenderingHint
GdipGetImageGraphicsContext
ole32
OleInitialize
CoCreateInstance
OleUninitialize
CLSIDFromString
CreateStreamOnHGlobal
CLSIDFromString
imm32
ImmReleaseContext
ImmGetContext
ImmSetCompositionWindow
ImmGetCompositionStringW
ImmAssociateContext
shell32
SHAppBarMessage
ShellExecuteA
ShellExecuteA
Shell_NotifyIconA
SHGetSpecialFolderPathA
shlwapi
PathFileExistsA
winmm
PlaySoundA
waveOutOpen
midiOutPrepareHeader
midiStreamProperty
midiStreamOpen
midiOutUnprepareHeader
waveOutGetNumDevs
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
waveOutPrepareHeader
waveOutUnprepareHeader
midiStreamRestart
midiStreamClose
midiOutReset
midiStreamStop
waveOutRestart
PlaySoundA
midiStreamOut
ws2_32
inet_addr
inet_ntoa
gethostbyname
WSAStartup
ntohl
accept
getpeername
recv
WSACleanup
connect
select
send
closesocket
ioctlsocket
WSAAsyncSelect
htons
socket
recvfrom
msvfw32
DrawDibDraw
avifil32
AVIStreamInfoA
AVIStreamGetFrame
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comdlg32
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueA
oleaut32
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
comctl32
ImageList_Read
ImageList_Destroy
ord17
_TrackMouseEvent
ImageList_SetBkColor
ImageList_GetImageCount
ImageList_Duplicate
Sections
.text Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9.0MB - Virtual size: 9.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 436KB - Virtual size: 806KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 304KB - Virtual size: 303KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ