Static task
static1
Behavioral task
behavioral1
Sample
de68d813c13781502230e837cf5e83bbb4a50f201c7d71860bb299b78da6b808.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
de68d813c13781502230e837cf5e83bbb4a50f201c7d71860bb299b78da6b808.exe
Resource
win10v2004-20231020-en
General
-
Target
de68d813c13781502230e837cf5e83bbb4a50f201c7d71860bb299b78da6b808
-
Size
490KB
-
MD5
efb4a89ac7c89672f9aa12cdc1ea198e
-
SHA1
ba283309efe0d3745f64b004076c6c7ca3763e77
-
SHA256
de68d813c13781502230e837cf5e83bbb4a50f201c7d71860bb299b78da6b808
-
SHA512
7b24fd64abf91eb41606622176e0f1f877c238f6d60cc0c6ea3714be66b316600c03a1c5420592702472ca8caf38ed2f7537764ff9564c3e2e3315e33c939774
-
SSDEEP
6144:eyEXuyDdQ9YG4kzA+oRizBh/88SCTeBMDMXRzQ1ZJ2IreRQ/LArdLgIQItj:vEXuyhlAFoiNh/8ThzqreSIkej
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de68d813c13781502230e837cf5e83bbb4a50f201c7d71860bb299b78da6b808
Files
-
de68d813c13781502230e837cf5e83bbb4a50f201c7d71860bb299b78da6b808.exe windows:5 windows x64
de361320741c3eefff5c87665ab4f6f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
SetForegroundWindow
MessageBoxA
ExitWindowsEx
EnumWindows
IsIconic
ShowWindow
MessageBoxW
GetLastActivePopup
IsWindowVisible
GetWindowThreadProcessId
MonitorFromPoint
advapi32
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
LookupPrivilegeValueA
ole32
CreateStreamOnHGlobal
CoCreateInstance
CoInitializeEx
GetHGlobalFromStream
CoUninitialize
kernel32
GetStringTypeW
GetStringTypeA
HeapReAlloc
QueryPerformanceCounter
GetTimeZoneInformation
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
WriteConsoleA
SetStdHandle
CompareStringA
CompareStringW
GetLocaleInfoW
SetEndOfFile
GetLocaleInfoA
SetCurrentDirectoryA
HeapCreate
HeapSetInformation
IsValidCodePage
GetOEMCP
GetACP
GetLastError
CreateFileW
SetFilePointer
WriteFile
ReadFile
GetProcAddress
LoadLibraryA
GetUserDefaultLCID
CloseHandle
CreateFileA
CreateDirectoryA
FlushFileBuffers
WriteConsoleW
GetFileType
GetStdHandle
GetLongPathNameW
ExitProcess
RemoveDirectoryA
MultiByteToWideChar
AreFileApisANSI
FindClose
FindFirstFileA
FindFirstFileW
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetWindowsDirectoryW
SetHandleInformation
CreatePipe
GetShortPathNameA
GetModuleFileNameA
GetShortPathNameW
GetModuleFileNameW
GetCurrentProcessId
GetLongPathNameA
FoldStringW
GetWindowsDirectoryA
GetEnvironmentVariableW
GetEnvironmentVariableA
GetTempPathW
GetTempPathA
GetTempFileNameA
GetFullPathNameW
GetFullPathNameA
FindNextFileA
DeleteFileA
LoadLibraryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
GetExitCodeThread
WaitForSingleObject
CreateThread
GetConsoleOutputCP
SetEnvironmentVariableA
GetProcessHeap
GetCurrentDirectoryA
GetVersionExA
CreateProcessA
SearchPathA
GetSystemTimeAsFileTime
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
Sleep
GetMailslotInfo
CreateMailslotA
GetCommandLineW
CreateSemaphoreA
LocalFree
GetCurrentProcess
LocalAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
GlobalUnlock
GlobalSize
GlobalLock
GetTickCount
AllocConsole
GetModuleHandleA
LoadLibraryExA
SetEnvironmentVariableW
SetCurrentDirectoryW
WideCharToMultiByte
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RaiseException
RtlPcToFileHeader
RtlUnwindEx
CreateDirectoryW
RemoveDirectoryW
HeapAlloc
HeapFree
DebugBreak
GetCommandLineA
GetStartupInfoA
LCMapStringA
LCMapStringW
GetCPInfo
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapSize
GetModuleHandleW
GetConsoleCP
GetConsoleMode
SetHandleCount
Sections
.text Size: 239KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ