Static task
static1
Behavioral task
behavioral1
Sample
91489f95b82221fd85001c4afeb37b571c07d00584b2bb38618cb537252dc4b4.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
91489f95b82221fd85001c4afeb37b571c07d00584b2bb38618cb537252dc4b4.exe
Resource
win10v2004-20231020-en
General
-
Target
91489f95b82221fd85001c4afeb37b571c07d00584b2bb38618cb537252dc4b4
-
Size
590KB
-
MD5
9d882a004538694bd625a6200c81a3d0
-
SHA1
e9d4c4633ace3d977273f7936bcd14cd02376ace
-
SHA256
91489f95b82221fd85001c4afeb37b571c07d00584b2bb38618cb537252dc4b4
-
SHA512
9b501b9acca1cbabc722cb6dd116b635701b0ecfa45eb138264854afddb80c7ae70aca70a93f38dee37c13c4d7d974e31eced4075e814ac6f9cefe467f1f0067
-
SSDEEP
12288:G0ExbAHnnKBlsvyNa/5nWRztwhQ71yc4aS5uYLXSErx6PTbzefqqUbp3xtdyS+JQ:GpbAH9vyNa/5nW726p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 91489f95b82221fd85001c4afeb37b571c07d00584b2bb38618cb537252dc4b4
Files
-
91489f95b82221fd85001c4afeb37b571c07d00584b2bb38618cb537252dc4b4.exe windows:5 windows x86
4f9baf98b2b2d58a659b6a7f74d7f540
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
HeapSize
IsValidCodePage
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
SetStdHandle
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
SetEnvironmentVariableA
HeapReAlloc
RaiseException
RtlUnwind
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetStartupInfoW
GetFileTime
GetFileSizeEx
GetFileAttributesW
GetSystemInfo
FileTimeToLocalFileTime
GetTickCount
SetErrorMode
CreateFileW
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
FileTimeToSystemTime
GetThreadLocale
lstrlenA
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetModuleHandleA
InterlockedDecrement
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
VirtualAlloc
VirtualProtect
CompareStringA
InterlockedExchange
FormatMessageW
MulDiv
lstrlenW
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
SetLastError
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
FreeResource
ReleaseSemaphore
WaitForSingleObject
GetModuleFileNameA
CreateSemaphoreW
GlobalFree
GlobalAlloc
WideCharToMultiByte
LocalFree
FreeLibrary
LoadLibraryW
GetVersionExW
MultiByteToWideChar
WritePrivateProfileStringW
ExitProcess
CreateThread
InitializeCriticalSection
Sleep
GetCurrentProcess
GetModuleHandleW
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
DeleteCriticalSection
GetLastError
CreateMutexW
CloseHandle
FindResourceW
LoadResource
LockResource
GetOEMCP
SizeofResource
user32
UnregisterClassW
CharUpperW
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableW
SetRect
IsRectEmpty
CharNextW
ReleaseCapture
SetCapture
LoadCursorW
GetSysColorBrush
DestroyMenu
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowThreadProcessId
SetCursor
GetMessageW
TranslateMessage
ValidateRect
ReleaseDC
GetDC
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetMenuState
CheckMenuItem
ShowWindow
MoveWindow
IsDialogMessageW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
SetMenu
IsWindowVisible
UpdateWindow
PostMessageW
GetMenuItemID
GetMenuItemCount
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
PostThreadMessageW
RegisterClipboardFormatW
SetWindowTextW
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
CopyRect
PtInRect
GetMenu
SetWindowLongW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetKeyState
WindowFromPoint
ScreenToClient
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
GetCursorPos
EnableMenuItem
ModifyMenuW
GetSubMenu
LoadMenuW
SetForegroundWindow
SetWindowPos
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
LoadIconW
MessageBoxExW
SendMessageW
EnableWindow
gdi32
GetBkColor
GetTextColor
GetMapMode
RectVisible
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
GetRgnBox
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateRectRgnIndirect
GetDeviceCaps
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
TextOutW
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
StartServiceW
RegSetKeyValueW
RegDeleteKeyValueW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
ControlService
RegCloseKey
QueryServiceStatus
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegQueryValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExW
shell32
Shell_NotifyIconW
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
PathRemoveFileSpecA
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathFileExistsW
PathRemoveFileSpecW
PathIsUNCW
oledlg
OleUIBusyW
ole32
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoFreeUnusedLibraries
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysFreeString
crypt32
CryptProtectData
iphlpapi
GetUdpTable
ws2_32
WSAStartup
WSAGetLastError
WSACleanup
ntohs
Sections
.text Size: 255KB - Virtual size: 254KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 215KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ