Static task
static1
Behavioral task
behavioral1
Sample
866c5cf4107c897be34a89f75b8f9b7b23588ec2e3d96f5f1e9a0eee89bff587.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
866c5cf4107c897be34a89f75b8f9b7b23588ec2e3d96f5f1e9a0eee89bff587.exe
Resource
win10v2004-20231023-en
General
-
Target
866c5cf4107c897be34a89f75b8f9b7b23588ec2e3d96f5f1e9a0eee89bff587
-
Size
1.0MB
-
MD5
68201f0eb5f89956f4d4ceec3aa6282e
-
SHA1
b43e054731fe133c9006fb7e6eb2689240886da7
-
SHA256
866c5cf4107c897be34a89f75b8f9b7b23588ec2e3d96f5f1e9a0eee89bff587
-
SHA512
37570381de3be250e05aa637be3a108b2771a7619bec019aea798d82f4a91c0be5666e5e968f0df14aaad2cbdd622d8b2769e31d3422a5129ed4beb9ed455a1f
-
SSDEEP
12288:8xKJAPL3ZTts9WrF5tx2LimdEPZvn8SBzzERf7P01s0L7B:mGKbZUCFrx2Gmdun8S1E9o1s6B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 866c5cf4107c897be34a89f75b8f9b7b23588ec2e3d96f5f1e9a0eee89bff587
Files
-
866c5cf4107c897be34a89f75b8f9b7b23588ec2e3d96f5f1e9a0eee89bff587.exe windows:5 windows x86
a99229115734da97995a350c2356329e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleacc
AccessibleObjectFromWindow
kernel32
EnterCriticalSection
InterlockedDecrement
LeaveCriticalSection
GetProcAddress
FreeLibrary
InterlockedIncrement
lstrcmpiW
LoadLibraryExW
GetCPInfo
FindResourceW
LoadResource
FindResourceExW
LockResource
Sleep
SizeofResource
GetProcessHeap
DeleteCriticalSection
HeapDestroy
WideCharToMultiByte
GetCurrentProcessId
CreateThread
CloseHandle
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
MultiByteToWideChar
SetFileAttributesW
GetFileAttributesW
CreateFileW
GetProcessId
GetModuleFileNameW
CreateDirectoryW
MulDiv
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
GetModuleHandleW
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetACP
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
VirtualQuery
VirtualProtect
GetSystemInfo
RtlUnwind
QueryPerformanceCounter
GetStartupInfoW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
GetLocaleInfoW
LCMapStringW
ReadFile
SetFilePointer
GetFileSize
SetLastError
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcmpW
GetCurrentProcess
GetEnvironmentVariableW
FormatMessageW
LocalFree
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
GetStringTypeW
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
user32
InvalidateRect
UpdateWindow
BeginPaint
UnregisterClassW
EndPaint
GetDesktopWindow
GetWindowLongW
CallWindowProcW
PostMessageW
SetWindowLongW
CharNextW
MessageBoxW
GetWindowThreadProcessId
GetMessageW
DefWindowProcW
GetWindowRect
DestroyWindow
GetDC
IsWindowVisible
SetWindowPos
EnumChildWindows
CreateWindowExW
RegisterClassExW
ShowWindow
IsWindow
DispatchMessageW
GetWindowTextW
GetCursorPos
ReleaseDC
SetForegroundWindow
ReleaseCapture
RegisterWindowMessageW
GetParent
GetClassInfoExW
GetDlgItem
GetClientRect
SetCapture
SetFocus
SetLayeredWindowAttributes
CreateAcceleratorTableW
GetSysColor
IsChild
DestroyAcceleratorTable
ClientToScreen
RedrawWindow
InvalidateRgn
SetWindowTextW
SendMessageW
ScreenToClient
FillRect
GetFocus
GetWindow
GetWindowTextLengthW
SetTimer
PeekMessageW
MoveWindow
EnumWindows
LoadBitmapW
TranslateMessage
LoadCursorW
GetClassNameW
DrawTextW
gdi32
GetDIBits
BitBlt
SelectObject
CreateCompatibleDC
GetDeviceCaps
SetTextColor
SetBkMode
DeleteObject
CreateFontIndirectW
CreateSolidBrush
GetObjectW
DeleteDC
GetStockObject
CreateCompatibleBitmap
advapi32
CryptReleaseContext
CryptAcquireContextW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumKeyW
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptCreateHash
shell32
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
ole32
OleLockRunning
CoGetClassObject
OleUninitialize
StringFromGUID2
CoTaskMemRealloc
CreateStreamOnHGlobal
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoCreateGuid
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
CoInitialize
oleaut32
LoadTypeLi
OleCreateFontIndirect
VarBstrCat
SysStringLen
SysAllocStringLen
LoadRegTypeLi
VariantClear
VarBstrCmp
SysAllocString
SysFreeString
VariantInit
VarUI4FromStr
shlwapi
UrlEscapeW
PathAppendW
PathAddBackslashW
UrlUnescapeW
wininet
InternetCloseHandle
HttpSendRequestW
InternetCrackUrlW
InternetOpenW
HttpOpenRequestW
InternetConnectW
Sections
.text Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 689KB - Virtual size: 689KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ