Static task
static1
Behavioral task
behavioral1
Sample
b5713cbbd1548189fa756da0cf359b2b490c44ad728e28ff87d584c85b9accdc.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b5713cbbd1548189fa756da0cf359b2b490c44ad728e28ff87d584c85b9accdc.exe
Resource
win10v2004-20231020-en
General
-
Target
b5713cbbd1548189fa756da0cf359b2b490c44ad728e28ff87d584c85b9accdc
-
Size
608KB
-
MD5
a41e94489fb4a08ea1164cb96ec91e8a
-
SHA1
a18b3d56fd66f839188c0844fa6a9346d283dc28
-
SHA256
b5713cbbd1548189fa756da0cf359b2b490c44ad728e28ff87d584c85b9accdc
-
SHA512
0ddcdab45599e6f97acbfc1ba1840cae20adc963d8888840a6826ed27d5f640f037650a39ae835f4f1003b62b0345981fd90a5f4b3ea3ee177ed0f2c659f3dc6
-
SSDEEP
3072:SWpPgxJgAVMCrwghb+Vjtx9CXNIoAaF4tU/tsLy706ZOnQy8A9FwjxH99999999n:xp4lOW+DC96Hy9ZOnQyo999999999x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5713cbbd1548189fa756da0cf359b2b490c44ad728e28ff87d584c85b9accdc
Files
-
b5713cbbd1548189fa756da0cf359b2b490c44ad728e28ff87d584c85b9accdc.exe windows:4 windows x86
b8cd7ae1ed2447574d0204e1e1138ac9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrIA
kernel32
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GetProcessVersion
GetCPInfo
GetOEMCP
GetFileAttributesA
GetFileSize
GetFileTime
SetErrorMode
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
HeapAlloc
HeapFree
TerminateProcess
HeapSize
HeapReAlloc
GetACP
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
SetLastError
lstrcmpA
GetCurrentThread
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
lstrlenA
lstrcpynA
lstrcpyA
FindFirstFileA
FindClose
ExpandEnvironmentStringsA
WinExec
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpiA
OutputDebugStringA
UnmapViewOfFile
LocalAlloc
CreateFileMappingA
MapViewOfFile
LocalFree
GetProcAddress
GetModuleFileNameA
LoadLibraryA
CreateThread
WaitForSingleObject
FreeLibrary
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ReleaseMutex
CreateMutexA
CloseHandle
GetPrivateProfileIntA
GetPrivateProfileStructA
WritePrivateProfileStructA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
WritePrivateProfileStringA
GetPrivateProfileStringA
GetLastError
GetTimeZoneInformation
user32
AdjustWindowRectEx
SetFocus
GetFocus
DispatchMessageA
PeekMessageA
GetSysColor
MapWindowPoints
LoadIconA
SetWindowTextA
IsWindowEnabled
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
PostQuitMessage
SetCursor
ValidateRect
GetActiveWindow
TranslateMessage
ClientToScreen
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
CharUpperA
PtInRect
LoadCursorA
GetSysColorBrush
GetClientRect
CopyRect
IsWindowVisible
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
SetWindowPos
RegisterWindowMessageA
GetWindowPlacement
wsprintfA
WindowFromPoint
mouse_event
SetCursorPos
GetSystemMetrics
SendMessageA
AttachThreadInput
GetForegroundWindow
GetWindowThreadProcessId
ShowWindow
GetLastActivePopup
SetForegroundWindow
CreatePopupMenu
AppendMenuA
SetMenuDefaultItem
TrackPopupMenu
DestroyMenu
IsIconic
SetActiveWindow
LoadStringA
SetWindowLongA
SystemParametersInfoA
GetMessageA
PostThreadMessageA
SetTimer
KillTimer
FindWindowA
PostMessageA
EnableWindow
GetWindow
GetWindowLongA
GetCursorPos
ScreenToClient
ChildWindowFromPoint
GetParent
EnumChildWindows
GetWindowRect
GetClassNameA
GetDesktopWindow
GetMessagePos
UnregisterClassA
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetBkColor
SetViewportOrgEx
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetMapMode
SetTextColor
GetClipBox
GetStockObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SelectObject
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
ShellExecuteA
Shell_NotifyIconA
SHGetFileInfoA
comctl32
ord17
ole32
CoCreateInstance
CoUninitialize
CoInitialize
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 460KB - Virtual size: 459KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ