Static task
static1
Behavioral task
behavioral1
Sample
26f9d0bd5780273caaf1a5406a3a93ddd780778b47b5cc58149750d487edebd7.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
26f9d0bd5780273caaf1a5406a3a93ddd780778b47b5cc58149750d487edebd7.exe
Resource
win10v2004-20231020-en
General
-
Target
26f9d0bd5780273caaf1a5406a3a93ddd780778b47b5cc58149750d487edebd7
-
Size
9.3MB
-
MD5
fc6ff3571358f3920dc9105a5e0acdf6
-
SHA1
03493b31c5d1242184ad65fe8f791dc79a3ce9cc
-
SHA256
26f9d0bd5780273caaf1a5406a3a93ddd780778b47b5cc58149750d487edebd7
-
SHA512
270f4b4949e4c76a0abff447dbc74e4ca52363a67fadb156fe0355ee3ef37f9a11a57b5327cb1bf6ffe66b95497f5c03ae975ce6ff7a197e5790d08261600c89
-
SSDEEP
196608:ly8pandPKieFMXVmI6YyHEUgshyqYck3TUvpgHVIdyPZ5lnly4aprYP+9V8uDv:lr2dJ56YgEYyqk3gvLIK6+9V8uDv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26f9d0bd5780273caaf1a5406a3a93ddd780778b47b5cc58149750d487edebd7
Files
-
26f9d0bd5780273caaf1a5406a3a93ddd780778b47b5cc58149750d487edebd7.exe windows:5 windows x86
6b6b8ce22b749da1ba7e758df02dd0d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceW
WriteFile
SizeofResource
LoadResource
LockResource
SetCurrentDirectoryW
MulDiv
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetModuleHandleW
GetLastError
GetCurrentProcessId
GetCurrentDirectoryW
FreeLibraryAndExitThread
ExitThread
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
ExpandEnvironmentStringsW
GetTempPathW
WaitForMultipleObjects
GetSystemDirectoryA
SleepEx
ResetEvent
SetEvent
lstrlenA
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
GetFileSizeEx
GetFileInformationByHandle
InterlockedCompareExchange
CreateEventW
LocalFree
LocalAlloc
WideCharToMultiByte
OutputDebugStringA
Sleep
InterlockedDecrement
InterlockedIncrement
CreateFileW
WritePrivateProfileStringW
DeleteFileW
GlobalAlloc
GlobalLock
GlobalUnlock
PeekNamedPipe
MultiByteToWideChar
GetModuleFileNameW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GlobalFree
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
DecodePointer
HeapDestroy
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetSystemInfo
FormatMessageW
GetVersionExW
GetPrivateProfileStringW
FindClose
CreateDirectoryW
FindFirstFileW
FindNextFileW
MoveFileExW
FileTimeToSystemTime
ReleaseMutex
CreateMutexW
GetTickCount
AreFileApisANSI
FlushInstructionCache
HeapCreate
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FreeResource
GetFullPathNameW
GetLocalTime
GetVersionExA
GetSystemTime
GetModuleHandleA
EncodePointer
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetStringTypeW
CompareStringW
LCMapStringW
GetFileType
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
OutputDebugStringW
WaitForSingleObjectEx
SetStdHandle
GetConsoleCP
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetEndOfFile
ReadFile
GetFileSize
CreateThread
QueryDosDeviceW
GetWindowsDirectoryW
LoadLibraryW
GetLogicalDriveStringsW
lstrcmpiW
CloseHandle
OpenProcess
LoadLibraryA
lstrlenW
SetLastError
GetProcessHeap
HeapFree
HeapAlloc
VirtualFree
VirtualAlloc
GetProcAddress
IsProcessorFeaturePresent
FreeLibrary
user32
GetCursorPos
ScreenToClient
GetClassNameW
DestroyIcon
LoadBitmapW
CreateIconFromResource
LoadImageW
CharNextW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
ClientToScreen
SetRect
EnableMenuItem
GetSysColor
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
GetSystemMetrics
IsWindowVisible
DrawTextW
SystemParametersInfoA
CharLowerBuffW
MapVirtualKeyA
UpdateLayeredWindow
IsMenu
IsWindowEnabled
CreatePopupMenu
DestroyMenu
GetMenuItemCount
AppendMenuW
TrackPopupMenu
GetMenuInfo
SetMenuInfo
GetMenuItemInfoW
SetMenuContextHelpId
InvalidateRect
GetWindowRect
GetClientRect
GetActiveWindow
GetDlgItem
CreateWindowExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
GetWindowLongW
GetFocus
SetFocus
PtInRect
EqualRect
IsRectEmpty
UnionRect
CopyRect
SetCursor
KillTimer
SetTimer
DestroyWindow
DestroyCursor
LoadCursorW
IntersectRect
LoadStringW
GetKeyState
UnregisterClassW
GetIconInfo
DrawIconEx
OffsetRect
InflateRect
ReleaseDC
GetDC
SendMessageW
ShowWindow
SetWindowPos
SetWindowTextW
IsWindow
EndPaint
BeginPaint
UpdateWindow
ReleaseCapture
SetForegroundWindow
FindWindowW
SetCapture
GetCapture
IsZoomed
IsIconic
SetLayeredWindowAttributes
AnimateWindow
PostQuitMessage
PostMessageW
TrackMouseEvent
MonitorFromWindow
GetMonitorInfoW
GetWindow
GetParent
SetWindowLongW
SystemParametersInfoW
MapWindowPoints
advapi32
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
ImpersonateLoggedOnUser
RevertToSelf
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountSidW
SetSecurityDescriptorDacl
OpenProcessToken
GetTokenInformation
SetTokenInformation
InitializeSecurityDescriptor
shell32
SHGetPathFromIDListW
SHGetFolderPathW
SHGetSpecialFolderPathW
SHBrowseForFolderW
ShellExecuteW
ole32
OleLockRunning
CLSIDFromString
CoCreateGuid
CLSIDFromProgID
CreateBindCtx
OleInitialize
OleUninitialize
CreateStreamOnHGlobal
CoCreateInstance
shlwapi
PathFileExistsW
StrToIntExW
psapi
EnumProcessModules
GetModuleFileNameExW
EnumProcesses
GetProcessImageFileNameW
crypt32
CryptMsgClose
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
CryptMsgGetParam
gdiplus
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
GdipGetImageHeight
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipCreateBitmapFromStream
GdipGetImageEncoders
GdipCreateBitmapFromScan0
GdipBitmapUnlockBits
GdipDeleteGraphics
GdipDrawImageI
GdipBitmapLockBits
GdipCreateBitmapFromFile
GdipGetImageEncodersSize
GdipDrawImageRectI
GdipGraphicsClear
GdipSaveImageToFile
imm32
ImmAssociateContext
ImmGetContext
ImmDestroyContext
ImmCreateContext
ImmReleaseContext
gdi32
GetStockObject
Rectangle
SetViewportOrgEx
GetObjectW
CreateFontIndirectW
SetBkMode
GetViewportOrgEx
StretchBlt
CreateSolidBrush
GetCurrentObject
EnumFontFamiliesExW
GetCharABCWidthsW
GetFontData
GetGlyphOutlineW
GetOutlineTextMetricsW
GetFontUnicodeRanges
GetGlyphIndicesW
GetTextExtentPointI
AddFontMemResourceEx
RemoveFontMemResourceEx
SetTextColor
DeleteDC
DeleteObject
ExtCreateRegion
IntersectClipRect
SelectClipRgn
SelectObject
SetGraphicsMode
SetWorldTransform
GetDeviceCaps
CreateBitmap
EnumFontsW
BitBlt
CreateDIBSection
CreateCompatibleDC
GdiFlush
GetTextFaceW
ExtTextOutW
GetTextMetricsW
SetTextAlign
oleaut32
SysAllocString
SysFreeString
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
ws2_32
ntohs
setsockopt
WSASetLastError
htonl
inet_addr
inet_ntoa
gethostbyaddr
gethostbyname
getservbyport
htons
__WSAFDIsSet
select
recvfrom
sendto
accept
listen
ioctlsocket
gethostname
getsockopt
getsockname
getpeername
connect
recv
bind
socket
closesocket
WSAGetLastError
send
getservbyname
WSAStartup
WSACleanup
usp10
ScriptShape
ScriptFreeCache
ScriptItemize
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 470KB - Virtual size: 469KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 376B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8.0MB - Virtual size: 8.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ