Static task
static1
Behavioral task
behavioral1
Sample
6788028e516ea389056c3972d4d5972de2b63261dd34bb8b1b11c8e7db13316b.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
6788028e516ea389056c3972d4d5972de2b63261dd34bb8b1b11c8e7db13316b.exe
Resource
win10v2004-20231020-en
General
-
Target
6788028e516ea389056c3972d4d5972de2b63261dd34bb8b1b11c8e7db13316b
-
Size
362KB
-
MD5
4186575b0ef400baa441e98be01a4bec
-
SHA1
8dc9b0a7cebdada31963819232d4943c8a4e5a21
-
SHA256
6788028e516ea389056c3972d4d5972de2b63261dd34bb8b1b11c8e7db13316b
-
SHA512
a464cb6aaf80b366d41bc89576302a7d5b7803b63602cb8e49cded94cbbc46288c33b727bf12a710cafb04f7ed5b6757c15fc7037e40ac7c8c6436c3ba914d7e
-
SSDEEP
6144:iVmoR6S0LMFWe7mFrWkGkv1UmD0ATnyCgYF:iVmoRB0LMEe7mFrWC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6788028e516ea389056c3972d4d5972de2b63261dd34bb8b1b11c8e7db13316b
Files
-
6788028e516ea389056c3972d4d5972de2b63261dd34bb8b1b11c8e7db13316b.exe windows:5 windows x86
49d8d85b5f035cf9b5dde2b981319e4b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
vDbgPrintExWithPrefix
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
comctl32
CreateStatusWindowW
CreateToolbarEx
InitCommonControlsEx
PropertySheetW
comdlg32
ChooseFontW
FindTextW
GetOpenFileNameW
GetSaveFileNameW
PageSetupDlgW
PrintDlgW
ReplaceTextW
kernel32
CloseHandle
CreateFileW
DeleteCriticalSection
EnterCriticalSection
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetEnvironmentVariableA
GetLastError
GetLocalTime
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetUserDefaultUILanguage
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LocalAlloc
LocalFree
LocalReAlloc
MulDiv
QueryPerformanceCounter
ReadFile
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
msvcrt
__dllonexit
__getmainargs
__initenv
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_errno
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnprintf
abort
atoi
bsearch
calloc
exit
fprintf
free
fwrite
isspace
malloc
memcmp
memmove
signal
sprintf
strchr
strcmp
strcpy
strcspn
strncmp
swprintf
vfprintf
wcstod
ole32
StgCreateDocfile
shell32
DragAcceptFiles
DragFinish
DragQueryFileW
SHAddToRecentDocs
SHGetFolderPathW
ShellAboutW
gdi32
BitBlt
CombineRgn
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
CreateFontW
CreatePen
CreateRectRgnIndirect
DeleteDC
DeleteObject
EndDoc
EndPage
EnumFontFamiliesExW
FillRgn
GetCurrentObject
GetDeviceCaps
GetStockObject
LineTo
MoveToEx
Rectangle
SelectObject
SetBkMode
SetRectRgn
SetTextAlign
StartDocW
StartPage
StretchBlt
TextOutW
user32
BeginPaint
CallWindowProcW
CheckDlgButton
CheckMenuItem
CheckRadioButton
ClientToScreen
CreateWindowExW
DefWindowProcW
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawEdge
EnableMenuItem
EnableWindow
EndDialog
EndPaint
FillRect
GetClientRect
GetDC
GetDlgItem
GetMenu
GetMenuItemInfoW
GetMessagePos
GetMessageW
GetParent
GetScrollInfo
GetScrollPos
GetSubMenu
GetSysColorBrush
GetSystemMetrics
GetWindowLongW
GetWindowPlacement
GetWindowTextA
GetWindowTextLengthW
GetWindowTextW
InflateRect
InsertMenuItemW
InvalidateRect
IsDialogMessageW
IsDlgButtonChecked
IsWindowVisible
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadMenuW
LoadStringW
MessageBoxA
MessageBoxIndirectW
MessageBoxW
MoveWindow
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
PtInRect
RegisterClassExW
RegisterWindowMessageW
ReleaseDC
RemoveMenu
ScreenToClient
ScrollWindow
SendMessageW
SetActiveWindow
SetCursor
SetFocus
SetMenu
SetMenuItemInfoW
SetProcessDefaultLayout
SetRect
SetScrollInfo
SetScrollPos
SetWindowLongW
SetWindowTextA
SetWindowTextW
ShowWindow
TrackPopupMenu
TranslateAcceleratorW
TranslateMessage
wsprintfW
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 14KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 213KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 81KB - Virtual size: 81KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ