Static task
static1
Behavioral task
behavioral1
Sample
a21d98677d85a835306e881a5db20210afdcb72dd6c7e866506392a1988b6a59.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a21d98677d85a835306e881a5db20210afdcb72dd6c7e866506392a1988b6a59.exe
Resource
win10v2004-20231020-en
General
-
Target
a21d98677d85a835306e881a5db20210afdcb72dd6c7e866506392a1988b6a59
-
Size
418KB
-
MD5
ad8c8620f7238845074e5dae0e12a9e8
-
SHA1
82de85727ce00694b237256f01b90d5c993ce3ae
-
SHA256
a21d98677d85a835306e881a5db20210afdcb72dd6c7e866506392a1988b6a59
-
SHA512
f7bcba1c215807054223c7c253bed8cb5b45551132ab3e4d5677eab7307ee06668616bbda1f1529ca23bd4cdd5be64a87c782b350339680b2038daae018aa066
-
SSDEEP
12288:GARtWSJ1828y4OPOxpm5kz7txFFPLy+Hg+:GA3WGxV4OGxpjbzLyx+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a21d98677d85a835306e881a5db20210afdcb72dd6c7e866506392a1988b6a59
Files
-
a21d98677d85a835306e881a5db20210afdcb72dd6c7e866506392a1988b6a59.exe windows:5 windows x64
de361320741c3eefff5c87665ab4f6f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
SetForegroundWindow
MessageBoxA
ExitWindowsEx
EnumWindows
IsIconic
ShowWindow
MessageBoxW
GetLastActivePopup
IsWindowVisible
GetWindowThreadProcessId
MonitorFromPoint
advapi32
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
LookupPrivilegeValueA
ole32
CreateStreamOnHGlobal
CoCreateInstance
CoInitializeEx
GetHGlobalFromStream
CoUninitialize
kernel32
GetStringTypeW
GetStringTypeA
HeapReAlloc
QueryPerformanceCounter
GetTimeZoneInformation
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
WriteConsoleA
SetStdHandle
CompareStringA
CompareStringW
GetLocaleInfoW
SetEndOfFile
GetLocaleInfoA
SetCurrentDirectoryA
HeapCreate
HeapSetInformation
IsValidCodePage
GetOEMCP
GetACP
GetLastError
CreateFileW
SetFilePointer
WriteFile
ReadFile
GetProcAddress
LoadLibraryA
GetUserDefaultLCID
CloseHandle
CreateFileA
CreateDirectoryA
FlushFileBuffers
WriteConsoleW
GetFileType
GetStdHandle
GetLongPathNameW
ExitProcess
RemoveDirectoryA
MultiByteToWideChar
AreFileApisANSI
FindClose
FindFirstFileA
FindFirstFileW
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetWindowsDirectoryW
SetHandleInformation
CreatePipe
GetShortPathNameA
GetModuleFileNameA
GetShortPathNameW
GetModuleFileNameW
GetCurrentProcessId
GetLongPathNameA
FoldStringW
GetWindowsDirectoryA
GetEnvironmentVariableW
GetEnvironmentVariableA
GetTempPathW
GetTempPathA
GetTempFileNameA
GetFullPathNameW
GetFullPathNameA
FindNextFileA
DeleteFileA
LoadLibraryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
GetExitCodeThread
WaitForSingleObject
CreateThread
GetConsoleOutputCP
SetEnvironmentVariableA
GetProcessHeap
GetCurrentDirectoryA
GetVersionExA
CreateProcessA
SearchPathA
GetSystemTimeAsFileTime
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
Sleep
GetMailslotInfo
CreateMailslotA
GetCommandLineW
CreateSemaphoreA
LocalFree
GetCurrentProcess
LocalAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
GlobalUnlock
GlobalSize
GlobalLock
GetTickCount
AllocConsole
GetModuleHandleA
LoadLibraryExA
SetEnvironmentVariableW
SetCurrentDirectoryW
WideCharToMultiByte
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RaiseException
RtlPcToFileHeader
RtlUnwindEx
CreateDirectoryW
RemoveDirectoryW
HeapAlloc
HeapFree
DebugBreak
GetCommandLineA
GetStartupInfoA
LCMapStringA
LCMapStringW
GetCPInfo
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapSize
GetModuleHandleW
GetConsoleCP
GetConsoleMode
SetHandleCount
Sections
.text Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ