Static task
static1
Behavioral task
behavioral1
Sample
520dfd888aa048c80d2689eefd8ba84f99038b98f646a0e22143756c564768c6.exe
Resource
win7-20231025-en
General
-
Target
520dfd888aa048c80d2689eefd8ba84f99038b98f646a0e22143756c564768c6
-
Size
8.0MB
-
MD5
80f612cc096f6f2077a63ac31ee9cb6c
-
SHA1
46597cb68bcfe42dcd38547e3ca22163d7fb2925
-
SHA256
520dfd888aa048c80d2689eefd8ba84f99038b98f646a0e22143756c564768c6
-
SHA512
20dbec0d1463081debfea885a1fb1529e9bf434cf0556f8a3219c7f22861d2d8dbb89631ccd0107f3653d66cb0fbb0cd6c3c67bd4ad2d8ebf6f2770522c94447
-
SSDEEP
196608:BeJhoAXalJUnVa3PlBOuJhQXMcKMMMkXY:B2Xa3PlBOTXHzY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 520dfd888aa048c80d2689eefd8ba84f99038b98f646a0e22143756c564768c6
Files
-
520dfd888aa048c80d2689eefd8ba84f99038b98f646a0e22143756c564768c6.exe windows:6 windows x86
1c6ede6b678a16f7a0f576c8f645a8f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dxgi
CreateDXGIFactory
d3d9
Direct3DCreate9
dwmapi
DwmGetWindowAttribute
gdiplus
GdipAlloc
GdipBitmapLockBits
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipSaveImageToStream
GdipGetImageHeight
GdipCloneImage
GdipFree
GdipGetImagePixelFormat
GdipCreateBitmapFromHICON
GdiplusShutdown
GdipCreateBitmapFromScan0
GdipGetImageWidth
GdipBitmapUnlockBits
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
pdh
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhRemoveCounter
PdhOpenQueryW
PdhGetFormattedCounterArrayW
PdhAddCounterW
PdhCloseQuery
kernel32
GetStdHandle
WriteConsoleA
OutputDebugStringA
GetDynamicTimeZoneInformation
GetConsoleMode
GetFileAttributesA
LocalFree
GetCurrentProcessId
FormatMessageA
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
QueryPerformanceFrequency
QueryPerformanceCounter
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
OpenProcess
GetModuleFileNameW
GetProcAddress
GetModuleHandleW
GetStartupInfoW
TerminateProcess
CreateProcessW
VerSetConditionMask
VerifyVersionInfoW
HeapFree
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
HeapSize
HeapReAlloc
RaiseException
GetSystemInfo
HeapAlloc
DecodePointer
DeleteCriticalSection
GetProcessHeap
IsWow64Process
GetExitCodeProcess
GetModuleHandleA
SwitchToThread
GetTickCount
QueryFullProcessImageNameW
GetCurrentProcess
GetSystemDirectoryW
GetWindowsDirectoryW
GetVersionExW
GetNativeSystemInfo
GetComputerNameW
GlobalMemoryStatusEx
InitializeCriticalSection
FreeLibrary
InterlockedDecrement
ReadFile
LocalAlloc
GetFileAttributesW
FileTimeToSystemTime
SetLastError
LoadLibraryExW
GetModuleFileNameA
lstrcmpW
ExpandEnvironmentStringsW
GetFullPathNameW
OutputDebugStringW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetCommandLineA
ExitThread
GetConsoleOutputCP
CreateDirectoryW
SetConsoleTextAttribute
GetConsoleScreenBufferInfo
CreateMutexW
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeW
CreateFileW
GetOverlappedResult
WaitForMultipleObjects
Sleep
CloseHandle
SetEvent
GetLastError
CreateEventW
GetCurrentThreadId
WaitForSingleObject
GetTimeZoneInformation
FlushFileBuffers
GetFileSizeEx
CancelIoEx
GetProcessTimes
WriteFile
GetVersionExA
SetEnvironmentVariableW
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetDriveTypeW
SetConsoleCtrlHandler
GetModuleHandleExW
ExitProcess
GetOEMCP
FindFirstFileExW
SetFilePointerEx
SetStdHandle
RtlUnwind
LoadLibraryW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SignalObjectAndWait
CreateTimerQueue
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ResetEvent
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
InitializeCriticalSectionAndSpinCount
EncodePointer
SetEndOfFile
ExpandEnvironmentStringsA
GetWindowsDirectoryA
GetCurrentProcessorNumber
CreateEventA
GetEnvironmentVariableA
InterlockedIncrement
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeConditionVariable
WakeConditionVariable
SleepConditionVariableSRW
MultiByteToWideChar
WideCharToMultiByte
IsValidCodePage
WriteConsoleW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
ReleaseSRWLockShared
AcquireSRWLockShared
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemDirectoryA
LoadLibraryA
VirtualAlloc
VirtualProtect
VirtualFree
GetFileType
GetEnvironmentVariableW
SwitchToFiber
DeleteFiber
CreateFiberEx
GetACP
GetSystemTimeAsFileTime
ConvertFiberToThread
ConvertThreadToFiberEx
SetConsoleMode
ReadConsoleA
ReadConsoleW
FindClose
FindFirstFileW
FindNextFileW
GetCurrentDirectoryW
GetSystemTime
SystemTimeToFileTime
VirtualQuery
TryEnterCriticalSection
FormatMessageW
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
GetExitCodeThread
GetStringTypeW
user32
ReleaseDC
GetDC
GetIconInfo
DestroyIcon
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
GetForegroundWindow
GetSystemMetrics
EnumWindows
gdi32
CreateDIBSection
DeleteObject
GetObjectW
BitBlt
SelectObject
DeleteDC
CreateCompatibleDC
GetDeviceCaps
advapi32
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
SetSecurityDescriptorDacl
GetTokenInformation
RegisterEventSourceA
GetLengthSid
OpenProcessToken
ReportEventA
IsValidSid
CopySid
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
DeregisterEventSource
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
RegGetValueA
InitializeSecurityDescriptor
shell32
SHGetFileInfoW
ole32
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
shlwapi
ord214
ord184
ord213
bcrypt
BCryptCloseAlgorithmProvider
BCryptGenRandom
BCryptOpenAlgorithmProvider
ws2_32
ntohs
ntohl
htonl
htons
setsockopt
listen
getsockname
getpeername
inet_ntop
getaddrinfo
WSAGetOverlappedResult
WSASocketA
WSAIoctl
WSAGetLastError
socket
closesocket
bind
WSACleanup
WSARecv
WSASend
WSASetLastError
WSAConnect
WSARecvFrom
ioctlsocket
getsockopt
select
gethostbyname
inet_pton
inet_addr
inet_ntoa
gethostbyaddr
getservbyport
getservbyname
recv
send
connect
freeaddrinfo
shutdown
gethostname
__WSAFDIsSet
recvfrom
WSAStartup
crypt32
CertEnumCertificatesInStore
CertOpenStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertFindCertificateInStore
CertCloseStore
dbghelp
SymFromAddr
iphlpapi
FreeMibTable
GetUnicastIpAddressTable
Sections
.text Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 856KB - Virtual size: 860KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE