Static task
static1
Behavioral task
behavioral1
Sample
5776332ef53f2974e995c8a9db0d48d1bdb6acb59ba09fc296f1c03f48abbb5f.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5776332ef53f2974e995c8a9db0d48d1bdb6acb59ba09fc296f1c03f48abbb5f.exe
Resource
win10v2004-20231020-en
General
-
Target
5776332ef53f2974e995c8a9db0d48d1bdb6acb59ba09fc296f1c03f48abbb5f
-
Size
196KB
-
MD5
99eb058e829471c3c898db11af19568c
-
SHA1
11ca8fcf7a6d063352b9f12a9e778af2840b0797
-
SHA256
5776332ef53f2974e995c8a9db0d48d1bdb6acb59ba09fc296f1c03f48abbb5f
-
SHA512
34a0ccf3e13e3e96436a436bc4719f2cb9ace1e4dea1f5ab0592ea1b44712a7113380c1f3d086553360626a3380b20c8dfb04b52046efb9bd6f5211b17b54784
-
SSDEEP
3072:tWzq2PmNKDFQ+JKinmSjPdr/Qd7Sg+OIxeqo032HIK2tEP6+:tWzqvMFQ+JJnmSjPhi7S9lee32HPC+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5776332ef53f2974e995c8a9db0d48d1bdb6acb59ba09fc296f1c03f48abbb5f
Files
-
5776332ef53f2974e995c8a9db0d48d1bdb6acb59ba09fc296f1c03f48abbb5f.exe windows:4 windows x86
707ddc1973c0c4f1ed880feaa0f19b0f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupFindFirstLineA
SetupGetLineTextA
SetupGetLineCountA
SetupGetLineByIndexA
SetupGetStringFieldA
SetupOpenInfFileA
SetupCloseInfFile
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiSetClassInstallParamsA
SetupDiCallClassInstaller
SetupDiDestroyDeviceInfoList
kernel32
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetProcAddress
GetModuleHandleA
InterlockedDecrement
FreeLibrary
InterlockedIncrement
GlobalGetAtomNameA
lstrcmpA
GetThreadLocale
GetCurrentThreadId
GlobalFlags
lstrcmpW
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
GlobalHandle
GetCurrentDirectoryA
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
GetFullPathNameA
HeapAlloc
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
RaiseException
VirtualAlloc
RtlUnwind
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
ExitProcess
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
GetACP
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetCurrentProcessId
GetModuleFileNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
FindResourceA
LoadResource
LockResource
SizeofResource
SetLastError
CreateFileA
GetFileSize
ReadFile
GetWindowsDirectoryA
SetFileAttributesA
GetVersionExA
lstrcpyA
lstrcatA
CreateProcessA
WaitForSingleObject
CloseHandle
GetShortPathNameW
Sleep
GetTempPathA
DeleteFileA
RemoveDirectoryA
lstrlenA
CompareStringW
CompareStringA
FindFirstFileA
CreateDirectoryA
CopyFileA
FindNextFileA
FindClose
LocalFree
LocalAlloc
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
user32
DestroyMenu
PostQuitMessage
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
GetFocus
ClientToScreen
GetWindow
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
MessageBoxA
wsprintfA
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetWindowTextA
LoadCursorA
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
IsIconic
LoadIconA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetDlgCtrlID
advapi32
RegSetValueExA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ControlService
QueryServiceStatus
RegOpenKeyA
shell32
SHGetSpecialFolderPathW
ShellExecuteExA
oleacc
CreateStdAccessibleObject
LresultFromObject
gdi32
GetStockObject
DeleteDC
RestoreDC
SaveDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ