Static task
static1
Behavioral task
behavioral1
Sample
603d0e1589e611fe3c9fb428cc71c67b9efd889d2937ee2c8725d7ed79c8dc6f.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
603d0e1589e611fe3c9fb428cc71c67b9efd889d2937ee2c8725d7ed79c8dc6f.exe
Resource
win10v2004-20231020-en
General
-
Target
603d0e1589e611fe3c9fb428cc71c67b9efd889d2937ee2c8725d7ed79c8dc6f
-
Size
476KB
-
MD5
d79d7ad4483e6b236c7ce9b9562c64d4
-
SHA1
e09544d3a13889e224e84cdf2538287de8f89d99
-
SHA256
603d0e1589e611fe3c9fb428cc71c67b9efd889d2937ee2c8725d7ed79c8dc6f
-
SHA512
2ee9a3d06da6ec8bb5ed768c2b0a75dafe05bf5bc5d4baafda9957ca587b8c36fc1e0716a5baa79186147d64e3537cc23e257937c4395841b9bb9e22bec21d76
-
SSDEEP
6144:ua4QboQBpRJHlwNcujd0rxB7QLSoXzSFCb2/4nGriAcy+A3FvcOAr4iOG2Hk0r6L:GXQBpRJKZxEJuzSUzy+ANpxHr626
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 603d0e1589e611fe3c9fb428cc71c67b9efd889d2937ee2c8725d7ed79c8dc6f
Files
-
603d0e1589e611fe3c9fb428cc71c67b9efd889d2937ee2c8725d7ed79c8dc6f.exe windows:5 windows x86
8238158cb01a9723930e5a8b4606fe35
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc90
ord3346
ord6391
ord1497
ord4644
ord5647
ord3244
ord3554
ord595
ord2899
ord6584
ord4013
ord538
ord5032
ord5496
ord5493
ord5286
ord1938
ord5495
ord5494
ord5216
ord5262
ord4594
ord4618
ord5153
ord5644
ord5137
ord753
ord3895
ord2592
ord3987
ord4993
ord6740
ord2057
ord5615
ord4617
ord5152
ord5309
ord2208
ord1810
ord1809
ord1678
ord3344
ord6388
ord1755
ord1752
ord4331
ord1496
ord4650
ord5585
ord2074
ord5497
ord6780
ord4589
ord5636
ord3732
ord5139
ord4688
ord1729
ord6446
ord5668
ord5666
ord958
ord963
ord967
ord965
ord969
ord2610
ord2630
ord2614
ord2620
ord2618
ord2616
ord2633
ord2628
ord2612
ord2635
ord2623
ord2605
ord2607
ord2625
ord2375
ord2368
ord1644
ord6784
ord4160
ord6782
ord2280
ord5389
ord6356
ord3218
ord1446
ord5608
ord2139
ord1792
ord1791
ord1728
ord5633
ord3135
ord4895
ord4668
ord3506
ord374
ord820
ord639
ord310
ord1098
ord4431
ord12384
ord13174
ord9952
ord10437
ord10284
ord13116
ord12145
ord12597
ord7746
ord9945
ord4434
ord4409
ord6783
ord4159
ord6781
ord4733
ord2251
ord2206
ord6018
ord4165
ord1046
ord5533
ord6721
ord5813
ord4199
ord693
ord6327
ord4252
ord3157
ord6333
ord2723
ord6335
ord817
ord3056
ord6291
ord1507
ord800
ord2360
ord1490
ord3896
ord756
ord1016
ord550
ord4678
ord1643
ord4686
ord5645
ord1711
ord2224
ord1409
ord4014
ord4996
ord266
ord265
ord2588
ord3528
ord2587
ord2069
ord3643
ord2087
ord3209
ord5657
ord5659
ord8432
ord4333
ord4981
ord5663
ord5646
ord6001
ord2766
ord2978
ord3107
ord4714
ord2961
ord3110
ord2769
ord2888
ord586
ord2327
ord789
ord6760
ord4030
ord6559
ord2759
ord4066
ord4067
ord4057
ord1045
ord2691
ord5835
ord945
ord1536
ord6048
ord4116
ord3730
ord6557
ord2470
ord6170
ord777
ord2283
ord2886
ord4334
ord4890
ord4667
ord9252
ord7118
ord7312
ord4029
ord1108
ord1358
ord3477
ord2106
ord316
ord2539
ord1183
ord601
ord3534
ord1137
ord798
ord1720
ord4646
ord3671
ord1276
msvcr90
_setmbcp
?what@exception@std@@UBEPBDXZ
_controlfp_s
_invoke_watson
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
fputc
strtol
_mktime32
_endthreadex
_beginthreadex
fread
srand
rand
memcpy
_strnicmp
strncmp
_vsnprintf
vsprintf_s
_strlwr
_strupr
realloc
memmove_s
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
atol
vsprintf
sprintf
fprintf
malloc
sprintf_s
fopen
fwrite
fclose
memcpy_s
free
strstr
strrchr
strchr
_time32
_localtime32
atoi
memset
_stricmp
__CxxFrameHandler3
kernel32
DeleteCriticalSection
EnterCriticalSection
InitializeCriticalSection
MultiByteToWideChar
GetLastError
InterlockedDecrement
GetPrivateProfileIntA
GetCurrentThreadId
FormatMessageA
lstrlenA
LocalAlloc
DeleteFileA
LocalFree
GetTickCount
Sleep
FindFirstFileA
FindNextFileA
GetWindowsDirectoryA
GetSystemDirectoryA
LeaveCriticalSection
Process32First
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
InterlockedIncrement
CreateToolhelp32Snapshot
WinExec
Process32Next
OpenProcess
GetExitCodeProcess
TerminateProcess
GetTempPathA
GetModuleFileNameA
CreateDirectoryA
FindClose
GetPrivateProfileStringA
GetComputerNameA
GetCurrentProcess
CreateSemaphoreA
TerminateThread
CloseHandle
GetCurrentThread
WideCharToMultiByte
WritePrivateProfileStringA
GetProcAddress
lstrcpyA
LoadLibraryA
FreeLibrary
GetPrivateProfileSectionA
WritePrivateProfileSectionA
user32
UpdateWindow
SendMessageA
EnableWindow
MsgWaitForMultipleObjects
PeekMessageA
TranslateMessage
DispatchMessageA
RegisterWindowMessageA
LoadBitmapA
wsprintfA
SetWindowLongA
LoadCursorA
CopyIcon
IsWindow
GetSysColor
SetCursor
GetMessagePos
KillTimer
SetTimer
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
GetClientRect
GetWindowRect
InflateRect
PtInRect
LoadIconA
PostThreadMessageA
LoadImageA
PostMessageA
GetParent
gdi32
GetStockObject
GetTextExtentPoint32A
CreateFontIndirectA
GetObjectA
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
shell32
ShellExecuteA
ole32
CoInitialize
CoInitializeEx
CLSIDFromString
CLSIDFromProgID
CoUninitialize
CoCreateInstance
OleRun
oleaut32
VariantInit
GetErrorInfo
SysStringLen
SysAllocString
VariantClear
VariantCopy
SysAllocStringByteLen
SysFreeString
SysStringByteLen
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
Sections
.text Size: 222KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ