Static task
static1
Behavioral task
behavioral1
Sample
71024498e6c94109bb6562129e35c05d3eb4dfba98e4a16ade9f316852742bd5.exe
Resource
win7-20231020-en
General
-
Target
71024498e6c94109bb6562129e35c05d3eb4dfba98e4a16ade9f316852742bd5
-
Size
3.3MB
-
MD5
30376677f3c490774ed9cca54b164bc5
-
SHA1
63ea26960b9b924634b8c44352689442be6cb3db
-
SHA256
71024498e6c94109bb6562129e35c05d3eb4dfba98e4a16ade9f316852742bd5
-
SHA512
4dea72caefdd07fb9208aa7e4a0902075e5020661566dc5b60cf34982ce7705b00ccbc743aaddcee7de4d91cd64fabcff0ccaab1d1c3f15aee2b930e2fd99290
-
SSDEEP
49152:34rluD2whUA8PQggggMgDRM49wvlUuF7fMgIgx71BCpaj+njmBKP/huEE9j7ZDTv:goUAekzOUu1IG1BWamCghadNis
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71024498e6c94109bb6562129e35c05d3eb4dfba98e4a16ade9f316852742bd5
Files
-
71024498e6c94109bb6562129e35c05d3eb4dfba98e4a16ade9f316852742bd5.exe windows:5 windows x86
2087139da21a019f8281779b708fc96a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
LocalFree
VerSetConditionMask
OpenProcess
VerifyVersionInfoW
GlobalAlloc
GetModuleHandleA
GetLocalTime
lstrcmpiW
lstrcpynW
InterlockedIncrement
InterlockedDecrement
lstrcpyW
GetCommandLineW
ReleaseMutex
CreateMutexW
WaitForMultipleObjects
SetUnhandledExceptionFilter
SetErrorMode
VirtualQuery
MoveFileW
InitializeCriticalSection
GlobalFree
LocalAlloc
TerminateProcess
GetLogicalDriveStringsW
GetVersionExW
FindClose
GetEnvironmentVariableW
GetDriveTypeW
SetFileTime
SetFileAttributesW
FindFirstFileW
FindNextFileW
MoveFileExW
GetSystemTime
GetSystemDirectoryW
DeviceIoControl
GetSystemDirectoryA
ResetEvent
VirtualAlloc
VirtualFree
VirtualProtect
LoadLibraryA
IsBadReadPtr
SetCurrentDirectoryA
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
LoadLibraryExW
LocalFileTimeToFileTime
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwind
GetTimeZoneInformation
ExitThread
GetModuleHandleExW
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetStdHandle
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
ReadConsoleW
SetConsoleCtrlHandler
SetStdHandle
SetEndOfFile
WriteConsoleW
GetFileAttributesExW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetFilePointer
WriteFile
MulDiv
ExitProcess
GetACP
CreateFileW
ReadConsoleA
SetConsoleMode
SwitchToFiber
DeleteFiber
CreateFiber
GlobalMemoryStatus
ConvertFiberToThread
ConvertThreadToFiber
GetCurrentDirectoryW
lstrlenW
ReadFile
GetFileSize
GlobalUnlock
GlobalLock
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetModuleHandleW
GetTickCount
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
QueryPerformanceFrequency
QueryPerformanceCounter
GetNativeSystemInfo
GetExitCodeThread
GetCurrentThread
SwitchToThread
GetCurrentProcess
WaitForSingleObjectEx
DuplicateHandle
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
FormatMessageW
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
IsDebuggerPresent
CreateDirectoryW
ReleaseSemaphore
GetFullPathNameW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetEnvironmentVariableA
CompareFileTime
SleepEx
SystemTimeToFileTime
DeleteCriticalSection
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
GetModuleFileNameW
FreeResource
LockResource
SizeofResource
LoadResource
FindResourceW
GetModuleFileNameA
DeleteFileW
GetLongPathNameW
GetTempPathW
FreeLibrary
GetProcAddress
LoadLibraryW
CopyFileW
Sleep
SetEvent
GetLastError
OpenEventW
CloseHandle
CreateEventW
GetCurrentThreadId
GetCurrentProcessId
CreateFileA
WaitForSingleObject
user32
MonitorFromPoint
GetWindowRgn
MoveWindow
UpdateLayeredWindow
MessageBoxW
SetWindowRgn
InflateRect
SetCursor
PtInRect
IsRectEmpty
OffsetRect
UnionRect
IntersectRect
GetSysColor
MapWindowPoints
ScreenToClient
GetCursorPos
InvalidateRect
GetUpdateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
KillTimer
SetTimer
ReleaseCapture
SetCapture
GetKeyState
GetFocus
GetActiveWindow
CharNextW
IsZoomed
IsIconic
CreateAcceleratorTableW
DestroyWindow
GetKeyNameTextW
MonitorFromWindow
DrawTextW
LoadCursorW
GetWindow
GetParent
SetWindowLongW
GetWindowLongW
GetWindowRect
GetClientRect
GetPropW
SetPropW
GetSystemMetrics
EnableWindow
SetFocus
FillRect
SetRect
CreatePopupMenu
DestroyMenu
EnableMenuItem
AppendMenuW
TrackPopupMenu
CreateCaret
GetCaretBlinkTime
GetUserObjectInformationW
GetProcessWindowStation
SetWindowPos
ShowWindow
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
RegisterClassW
CallWindowProcW
PostMessageW
InvalidateRgn
GetGUIThreadInfo
SetForegroundWindow
HideCaret
ShowCaret
SetCaretPos
GetCaretPos
ClientToScreen
UpdateWindow
PrivateExtractIconsW
DestroyIcon
DrawIconEx
EqualRect
SendMessageW
DispatchMessageW
TranslateMessage
GetMessageW
wsprintfW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
GetCursor
PeekMessageW
IsWindowEnabled
wsprintfA
CharPrevW
LoadImageW
DrawTextA
IsWindowVisible
MapVirtualKeyExW
PostQuitMessage
DefWindowProcW
GetMonitorInfoW
GetKeyboardLayout
advapi32
CryptSignHashW
CryptExportKey
CryptDecrypt
CryptCreateHash
CryptDestroyHash
RegCreateKeyExW
ImpersonateLoggedOnUser
GetUserNameW
RevertToSelf
SetEntriesInAclW
FreeSid
AllocateAndInitializeSid
RegQueryValueExW
RegCloseKey
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
OpenProcessToken
DeregisterEventSource
CryptGetProvParam
RegSetValueExW
RegOpenKeyExW
CryptSetHashParam
CryptEnumProvidersW
CryptGenRandom
CryptDestroyKey
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptGetUserKey
ole32
CreateStreamOnHGlobal
CoCreateInstance
DoDragDrop
OleDuplicateData
ReleaseStgMedium
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CoUninitialize
CoInitialize
oleaut32
VariantClear
VariantInit
SysAllocString
SysFreeString
shlwapi
PathIsDirectoryW
PathRemoveFileSpecW
PathIsSameRootW
SHDeleteKeyW
PathCombineW
PathFileExistsW
PathFindFileNameW
comctl32
_TrackMouseEvent
ord17
InitCommonControlsEx
dbghelp
MiniDumpWriteDump
psapi
EnumProcesses
GetProcessImageFileNameW
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
urlmon
ObtainUserAgentString
gdi32
GetObjectA
SetTextColor
SetStretchBltMode
StretchBlt
SetBkMode
TextOutW
GdiFlush
SetBkColor
ExtSelectClipRgn
CreatePatternBrush
GetTextExtentPointA
GetBitmapBits
SetBitmapBits
CreateCompatibleBitmap
SelectClipRgn
LineTo
CreateCompatibleDC
CreateDIBitmap
GetTextExtentPoint32W
GetClipBox
GetCharABCWidthsW
CreateSolidBrush
CreateRectRgnIndirect
CreatePenIndirect
CombineRgn
CreateDIBSection
PtInRegion
CreateRectRgn
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
PlayEnhMetaFile
GetEnhMetaFileHeader
CreateEnhMetaFileW
CloseEnhMetaFile
SelectObject
SaveDC
RestoreDC
Rectangle
RemoveFontMemResourceEx
AddFontMemResourceEx
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreatePen
MoveToEx
CreateFontIndirectW
BitBlt
shell32
DragQueryFileW
ShellExecuteExW
CommandLineToArgvW
SHGetSpecialFolderPathW
SHGetFolderPathW
SHGetFileInfoW
gdiplus
GdipCreatePath
GdipDeletePath
GdipAddPathLine
ord1
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipCloneImage
GdipDisposeImage
GdipCreateFromHDC
GdiplusShutdown
GdipDeleteGraphics
GdipFree
GdiplusStartup
GdipSetInterpolationMode
GdipDrawPath
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipDrawImageRectI
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipDrawRectangleI
GdipSetStringFormatTrimming
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipFillRectangleI
GdipSetSmoothingMode
GdipAlloc
GdipFillPath
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipSetTextRenderingHint
GdipGetImageWidth
GdipDeleteFont
GdipDrawString
GdipMeasureString
GdipStringFormatGetGenericTypographic
GdipSetStringFormatFlags
GdipCloneStringFormat
GdipDeleteStringFormat
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
ws2_32
socket
getnameinfo
sendto
gethostbyname
gethostname
WSAStartup
recvfrom
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAIoctl
WSASetLastError
shutdown
setsockopt
ntohs
htons
getsockopt
closesocket
recv
send
WSAGetLastError
bind
connect
getpeername
getsockname
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertGetEnhancedKeyUsage
CertFindCertificateInStore
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertOpenSystemStoreW
CertGetIntendedKeyUsage
CertOpenStore
wldap32
ord147
ord219
ord46
ord301
ord145
ord133
ord79
ord142
ord167
ord127
ord27
ord26
ord117
ord41
ord208
ord216
ord14
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 572KB - Virtual size: 571KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 48KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 336KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 173KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE