get_addr
Static task
static1
Behavioral task
behavioral1
Sample
71b4865722b548cd73b3c29bb28be768eff9f71169a227b06b00f0592b748958.exe
Resource
win7-20231020-en
General
-
Target
71b4865722b548cd73b3c29bb28be768eff9f71169a227b06b00f0592b748958
-
Size
1.9MB
-
MD5
80a072e39495e2cf2537316366f8d326
-
SHA1
663f9157a2aa51131b964f27f1fc360a74536ee9
-
SHA256
71b4865722b548cd73b3c29bb28be768eff9f71169a227b06b00f0592b748958
-
SHA512
259b4b8b0d608f84891a0d807ea9d562f211201e04c7ed0314d39b7bda47cd443881edd8eaa76e984f37a16ef6f80b8ea678d0d1245dcf9fae271d60bc9396fb
-
SSDEEP
49152:4nupZPwpch9/R1CB4TvAAvs1dNEZhbSlNhtjXRYz:4upZ4pcn/RY36hb+FW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71b4865722b548cd73b3c29bb28be768eff9f71169a227b06b00f0592b748958
Files
-
71b4865722b548cd73b3c29bb28be768eff9f71169a227b06b00f0592b748958.exe windows:5 windows x86
7b24277e254bc7c7476fd4e66f6a3e4e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
GetWindowsDirectoryW
CreateEventW
HeapAlloc
GetProcessHeap
HeapFree
TerminateThread
ExitProcess
CreateToolhelp32Snapshot
Process32FirstW
TerminateProcess
Process32NextW
CopyFileW
MoveFileW
lstrcatW
GetEnvironmentVariableW
GetTempFileNameW
GetDiskFreeSpaceExW
ResumeThread
GetThreadContext
SetThreadContext
VirtualQuery
InterlockedCompareExchange
GetCurrentThread
VirtualProtect
SuspendThread
MapViewOfFile
CreateFileMappingW
LoadLibraryA
GetFileAttributesExW
GetFileAttributesW
FlushViewOfFile
SetFileTime
SetFileAttributesW
LocalAlloc
GetLogicalDriveStringsA
GetVersion
GetSystemDirectoryA
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetPrivateProfileStringW
GetModuleHandleA
GetSystemDefaultLangID
GetFileType
SystemTimeToFileTime
GetCurrentDirectoryW
DosDateTimeToFileTime
FindResourceW
LoadResource
Sleep
lstrcmpW
MulDiv
SetEvent
OpenEventW
InterlockedIncrement
InterlockedDecrement
LoadLibraryExW
lstrcmpiW
FlushInstructionCache
GlobalUnlock
GlobalLock
GlobalAlloc
FreeResource
FindResourceExW
GetCurrentThreadId
GlobalMemoryStatusEx
CreateThread
CreateMutexW
GetExitCodeProcess
WaitForSingleObject
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetStartupInfoA
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
GetModuleFileNameA
GetStdHandle
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetStringTypeW
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
DeleteAtom
FindAtomW
TlsAlloc
AddAtomW
GetAtomNameW
TlsSetValue
TlsGetValue
SetEndOfFile
GetSystemTimeAsFileTime
FlushFileBuffers
IsProcessorFeaturePresent
HeapSize
OpenProcess
GetCurrentProcess
RemoveDirectoryW
lstrcpyW
GetFullPathNameW
SetLastError
FindClose
FindNextFileW
FindFirstFileW
MoveFileExW
GetTickCount
LockResource
SizeofResource
InterlockedExchange
lstrcmpiA
lstrcmpA
WideCharToMultiByte
lstrlenW
RaiseException
GetVersionExW
MultiByteToWideChar
lstrlenA
GetLastError
VirtualAlloc
ReadFile
VirtualFree
SetFilePointer
GetFileSize
LeaveCriticalSection
CreateFileW
EnterCriticalSection
FreeLibrary
DeleteCriticalSection
InitializeCriticalSection
GetProcAddress
CreateProcessW
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
GetCurrentProcessId
CloseHandle
HeapReAlloc
HeapDestroy
DeleteFileW
CreateDirectoryW
GetSystemDirectoryW
ExpandEnvironmentStringsW
GetTempPathW
WriteFile
CreateFileA
OpenMutexW
DeviceIoControl
user32
ShowWindow
GetWindowThreadProcessId
CallWindowProcW
GetDesktopWindow
GetSystemMetrics
WindowFromPoint
GetMessageW
TranslateMessage
SystemParametersInfoW
SetCursor
GetCursorPos
UpdateLayeredWindow
UpdateWindow
PostQuitMessage
GetShellWindow
PostMessageW
SetTimer
IsWindow
FindWindowW
SendMessageW
GetWindow
GetWindowRect
GetParent
GetCapture
TrackMouseEvent
AdjustWindowRectEx
DrawTextW
InflateRect
DrawIconEx
GetIconInfo
WindowFromDC
UnregisterClassA
DispatchMessageW
GetTopWindow
IsWindowVisible
RegisterClassExW
GetClassInfoExW
LoadCursorW
DefWindowProcW
DestroyWindow
GetDlgItem
CreateWindowExW
EndDialog
CharNextW
DestroyAcceleratorTable
ReleaseDC
GetWindowLongW
SetWindowLongW
MapWindowPoints
GetClientRect
GetMonitorInfoW
SetWindowPos
PtInRect
ExitWindowsEx
GetForegroundWindow
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
wsprintfW
LoadStringW
DialogBoxParamW
IsIconic
GetKeyState
MessageBoxW
KillTimer
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
BeginPaint
EndPaint
IsChild
GetFocus
SetFocus
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
ClientToScreen
ScreenToClient
MoveWindow
SetCapture
ReleaseCapture
FillRect
InvalidateRgn
InvalidateRect
GetDC
MonitorFromWindow
gdi32
CreateSolidBrush
CreateCompatibleBitmap
BitBlt
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
DeleteObject
CreateDIBSection
CreateCompatibleDC
DeleteDC
SetViewportOrgEx
GetObjectType
GetRandomRgn
GdiAlphaBlend
GetLayout
SetLayout
GetCurrentObject
SetBkMode
SetGraphicsMode
SetWorldTransform
ModifyWorldTransform
GetTextExtentPoint32W
CreateFontIndirectW
SelectClipRgn
CreateRectRgn
CombineRgn
OffsetRgn
GetRgnBox
CreateRectRgnIndirect
RectVisible
SaveDC
IntersectClipRect
RestoreDC
LPtoDP
advapi32
RegQueryInfoKeyW
RegOpenKeyExW
RegCreateKeyA
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegSetKeySecurity
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
RegSetValueExW
RegCreateKeyExW
DuplicateTokenEx
GetTokenInformation
SetNamedSecurityInfoW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegQueryValueExW
RegEnumKeyExW
shell32
SHGetFolderPathW
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteW
ShellExecuteExW
SHGetSpecialFolderPathW
SHChangeNotify
SHFileOperationW
ole32
PropVariantClear
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
OleUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
RegisterDragDrop
RevokeDragDrop
DoDragDrop
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
oleaut32
CreateStdDispatch
CreateDispTypeInfo
VariantChangeType
VarCmp
SysAllocStringLen
LoadTypeLi
VariantCopy
LoadRegTypeLi
OleCreateFontIndirect
VarUI4FromStr
VarBstrCmp
SysStringLen
VariantClear
SysAllocString
SysFreeString
VariantInit
shlwapi
StrStrIW
StrCmpIW
SHDeleteKeyW
StrToIntW
SHDeleteEmptyKeyW
PathRemoveBackslashW
SHStrDupW
PathFindExtensionW
SHDeleteValueW
SHSetValueA
PathIsRootW
SHGetValueA
SHSetValueW
PathAppendW
PathRemoveFileSpecW
PathFindFileNameW
SHGetValueW
PathFileExistsW
comctl32
InitCommonControlsEx
wintrust
WinVerifyTrust
psapi
EnumProcessModules
GetModuleFileNameExW
GetModuleInformation
wininet
HttpAddRequestHeadersA
InternetOpenUrlW
InternetErrorDlg
InternetCrackUrlW
HttpQueryInfoA
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
InternetQueryOptionW
InternetSetOptionW
HttpSendRequestW
HttpQueryInfoW
InternetReadFile
InternetCloseHandle
crypt32
CryptQueryObject
CryptMsgGetParam
CertFindCertificateInStore
CertFreeCertificateContext
CertCloseStore
CryptMsgClose
CertGetNameStringW
netapi32
Netbios
gdiplus
GdiplusStartup
GdiplusShutdown
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
setupapi
SetupIterateCabinetW
Exports
Exports
Sections
.text Size: 978KB - Virtual size: 978KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 49KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 552KB - Virtual size: 552KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 152KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE