Static task
static1
Behavioral task
behavioral1
Sample
9ae8358b5037728955ea63171e44565988bcc014ff8394da5fd2175c6880373b.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
9ae8358b5037728955ea63171e44565988bcc014ff8394da5fd2175c6880373b.exe
Resource
win10v2004-20231023-en
General
-
Target
9ae8358b5037728955ea63171e44565988bcc014ff8394da5fd2175c6880373b
-
Size
922KB
-
MD5
cd32d68b909f94410286c1b88422a776
-
SHA1
20fa8755eddebf2e10dd02d40e563340f58f451e
-
SHA256
9ae8358b5037728955ea63171e44565988bcc014ff8394da5fd2175c6880373b
-
SHA512
eedb0a8b162d8b3bba400d67573590792edfa5f7aa0f52216af3a7c3b3798c41fc30093ee3315ac51994f25dfe68ba255aff5e881d72c4ffd699aaa037048d3e
-
SSDEEP
6144:pIECfEvx4cfpcCzjn6FvKqD1bigeWriAcy+AdYjQD+SOGdjRev0MzM4sM+fwVLfv:pDfpc6GtROBly+AqgRwM4sM+E0o4HiE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9ae8358b5037728955ea63171e44565988bcc014ff8394da5fd2175c6880373b
Files
-
9ae8358b5037728955ea63171e44565988bcc014ff8394da5fd2175c6880373b.exe windows:5 windows x86
a787a33fb8fd26d0944322c2baf2cf0d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc90
ord2045
ord4022
ord6048
ord6787
ord6557
ord784
ord2286
ord1786
ord1723
ord4649
ord3269
ord3650
ord2592
ord6291
ord817
ord4431
ord316
ord1935
ord2046
ord615
ord2103
ord1604
ord4496
ord2277
ord1670
ord4640
ord3277
ord3487
ord6188
ord2721
ord436
ord1507
ord1603
ord6333
ord6335
ord2723
ord3140
ord4252
ord6327
ord2280
ord3346
ord6391
ord1497
ord4644
ord5647
ord3244
ord3554
ord595
ord945
ord686
ord693
ord3783
ord3987
ord4993
ord524
ord744
ord5167
ord2360
ord2899
ord6584
ord820
ord6740
ord5152
ord1938
ord1937
ord2057
ord5615
ord4617
ord5309
ord1810
ord1809
ord1678
ord3344
ord6388
ord1755
ord1752
ord4331
ord1496
ord4650
ord5585
ord2074
ord5497
ord6780
ord4589
ord5636
ord3732
ord5139
ord4688
ord1729
ord6446
ord5668
ord5666
ord958
ord963
ord967
ord965
ord969
ord2610
ord2630
ord265
ord2620
ord2618
ord2616
ord2633
ord2628
ord2612
ord2635
ord2623
ord2605
ord2607
ord2625
ord2375
ord2368
ord1644
ord6784
ord4160
ord6782
ord3671
ord5389
ord6356
ord3218
ord1446
ord5608
ord2139
ord1792
ord1791
ord1728
ord5633
ord3135
ord4895
ord4668
ord3506
ord374
ord639
ord4254
ord1108
ord2069
ord601
ord310
ord266
ord3534
ord2539
ord2106
ord2588
ord3528
ord1358
ord2587
ord800
ord3643
ord4646
ord1720
ord2283
ord777
ord6170
ord2470
ord3730
ord4116
ord1536
ord5835
ord2691
ord1045
ord6559
ord4030
ord6760
ord789
ord2327
ord586
ord3213
ord305
ord1611
ord1186
ord1098
ord2208
ord1183
ord12384
ord13174
ord9952
ord10437
ord10284
ord13116
ord12145
ord12597
ord7746
ord9945
ord4434
ord4409
ord6783
ord4159
ord6781
ord4733
ord2251
ord2206
ord6018
ord4165
ord1046
ord5533
ord6721
ord5813
ord4199
ord2087
ord3209
ord5657
ord5659
ord8432
ord4333
ord4981
ord5663
ord5646
ord6001
ord2766
ord2978
ord3107
ord4714
ord2961
ord3110
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4890
ord4667
ord9252
ord7118
ord798
ord7312
ord4029
ord1137
ord2614
ord3479
ord1276
msvcr90
_setmbcp
sprintf
_controlfp_s
_invoke_watson
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
fread
srand
memcpy
vsprintf_s
_strlwr
_strupr
realloc
memmove_s
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
malloc
fwrite
free
memset
fopen
vsprintf
fprintf
fclose
_localtime32
rand
atoi
_time32
strstr
strrchr
strncmp
strchr
atol
_strnicmp
_strdup
_stricmp
__CxxFrameHandler3
kernel32
FormatMessageA
LocalFree
GetProcAddress
LoadLibraryA
FreeLibrary
GetPrivateProfileIntA
lstrlenA
InterlockedDecrement
GetCurrentThreadId
WritePrivateProfileStringA
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
Sleep
DeleteFileA
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
GetTickCount
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
GetExitCodeProcess
TerminateProcess
GetModuleFileNameA
FindClose
GetPrivateProfileStringA
GetComputerNameA
GetCurrentProcess
CloseHandle
WideCharToMultiByte
lstrcpyA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
GetLastError
user32
PostMessageA
SendMessageA
IsIconic
DrawIcon
MessageBeep
SetWindowLongA
LoadCursorA
CopyIcon
IsWindow
GetSysColor
SetCursor
GetMessagePos
KillTimer
ReleaseDC
GetDC
ScreenToClient
InflateRect
PtInRect
wsprintfA
InvalidateRect
GetParent
GetWindowRect
OffsetRect
GetSystemMetrics
EnableWindow
LoadIconA
SetTimer
GetClientRect
gdi32
GetStockObject
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
shell32
ShellExecuteA
ole32
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
oleaut32
VariantInit
SysAllocString
VariantClear
SysFreeString
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
Sections
.text Size: 171KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 623KB - Virtual size: 622KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ