Static task
static1
Behavioral task
behavioral1
Sample
1d10c3123d6fcbd9a35ac6ac8dec28519059cfb43d89fa07564ea8f3c4c1682b.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1d10c3123d6fcbd9a35ac6ac8dec28519059cfb43d89fa07564ea8f3c4c1682b.exe
Resource
win10v2004-20231020-en
General
-
Target
1d10c3123d6fcbd9a35ac6ac8dec28519059cfb43d89fa07564ea8f3c4c1682b
-
Size
811KB
-
MD5
6f70cedbe3d708d6027570fc1c179787
-
SHA1
87e5bc382f9d98cc84bdcbf07e21ddfaa6230f4f
-
SHA256
1d10c3123d6fcbd9a35ac6ac8dec28519059cfb43d89fa07564ea8f3c4c1682b
-
SHA512
50edde42845927ed8d0b94ca3205b00ed308507b5d4fa26337f9639e3ce527d64d261284f6149113789f14b71e12479d555b9aec3c988b4132cdc796599c3df7
-
SSDEEP
12288:alt/yUw3EEiA1j1ndZcfRvFrvsTmIf4020Z7OxFz4W:aldXw3diAaZFLsTzg2Z7Wz9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d10c3123d6fcbd9a35ac6ac8dec28519059cfb43d89fa07564ea8f3c4c1682b
Files
-
1d10c3123d6fcbd9a35ac6ac8dec28519059cfb43d89fa07564ea8f3c4c1682b.exe windows:6 windows x86 arch:x86
5e91790542a177e80fa7c3b47b18d765
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
HeapFree
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
HeapSize
GetLastError
LockResource
HeapReAlloc
RaiseException
LoadResource
FindResourceW
HeapAlloc
DecodePointer
DeleteCriticalSection
WriteConsoleW
SetEnvironmentVariableA
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetStdHandle
SetFilePointerEx
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
LCMapStringW
GetConsoleMode
GetConsoleCP
ExitProcess
GetStdHandle
HeapQueryInformation
GetCommandLineW
GetCommandLineA
ExitThread
CreateThread
GetFileType
GetDriveTypeW
RtlUnwind
GetCPInfo
LCMapStringEx
GetStringTypeW
OutputDebugStringW
GetProcessHeap
CreateDirectoryW
GetCurrentProcess
WriteFile
GetModuleFileNameW
GetTempPathW
CreateFileW
CloseHandle
GetProcAddress
GetModuleHandleW
GetFullPathNameW
MultiByteToWideChar
GetFileAttributesW
FindFirstFileW
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
WideCharToMultiByte
lstrlenW
FindNextFileW
GetFileTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
GetCurrentProcessId
FormatMessageW
LocalFree
GetCurrentThreadId
OpenEventW
SetEvent
GetSystemTime
MoveFileW
LoadLibraryW
DeleteFileW
GetTempFileNameW
MoveFileExW
RemoveDirectoryW
SetFileAttributesW
CopyFileExW
InitializeCriticalSection
WaitForSingleObjectEx
ReleaseMutex
GetModuleHandleExW
FreeLibrary
FreeLibraryAndExitThread
WaitForMultipleObjects
VerSetConditionMask
VerifyVersionInfoW
lstrcmpiW
GetVersionExA
CreateEventW
ResetEvent
ResumeThread
SuspendThread
WaitForSingleObject
DuplicateHandle
GetCurrentThread
GetTimeZoneInformation
GetThreadLocale
SetThreadLocale
LocalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetEnvironmentStringsW
FreeEnvironmentStringsW
TerminateProcess
PeekNamedPipe
ReadFile
GetUserDefaultLCID
GetFileSizeEx
GetFileAttributesExW
GlobalFlags
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
GetCurrentDirectoryW
LocalReAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SystemTimeToTzSpecificLocalTime
UnlockFile
SetFilePointer
SetEndOfFile
LockFile
GetVolumeInformationW
GetFileSize
FlushFileBuffers
CompareStringW
GlobalFindAtomW
GetSystemDirectoryW
EncodePointer
MulDiv
LoadLibraryA
GlobalAddAtomW
GetPrivateProfileIntW
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
SetThreadPriority
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
SetLastError
OutputDebugStringA
GetACP
GetPrivateProfileStringW
WritePrivateProfileStringW
lstrcmpW
LoadLibraryExW
SetErrorMode
GetVersionExW
SizeofResource
user32
GetScrollPos
RedrawWindow
EndPaint
BeginPaint
UpdateWindow
SetMenu
GetMenu
GetCapture
SetFocus
GetDlgCtrlID
EndDeferWindowPos
DeferWindowPos
SetPropW
GetPropW
RemovePropW
GetWindowTextW
AdjustWindowRectEx
ScreenToClient
MapWindowPoints
GetSysColor
PtInRect
BeginDeferWindowPos
SetWindowLongW
GetTopWindow
WinHelpW
ShowWindow
SetDlgItemTextW
EnableWindow
IsIconic
GetClientRect
LoadIconW
DrawIcon
GetSystemMetrics
SendMessageW
GetWindowRect
IsCharAlphaW
PeekMessageW
TranslateMessage
DispatchMessageW
RegisterClipboardFormatW
PostQuitMessage
UnregisterClassW
SetWindowTextW
IsDialogMessageW
DrawTextW
DrawTextExW
GrayStringW
TabbedTextOutW
ClientToScreen
CharUpperW
RealChildWindowFromPoint
SetTimer
KillTimer
InvalidateRect
LoadCursorW
GetSysColorBrush
DestroyMenu
SetWindowPos
SetForegroundWindow
GetWindow
GetDlgItem
GetDC
ReleaseDC
GetWindowThreadProcessId
GetClassNameW
PostMessageW
LoadBitmapW
IsChild
SendDlgItemMessageW
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetForegroundWindow
GetParent
IsMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
GetMessageTime
GetMessagePos
RegisterWindowMessageW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetFocus
UnhookWindowsHookEx
GetMenuItemCount
GetMenuItemID
CopyRect
GetSubMenu
GetDesktopWindow
SetActiveWindow
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetLastActivePopup
MessageBoxW
IsWindowEnabled
SetCursor
CallNextHookEx
SetWindowsHookExW
GetCursorPos
ValidateRect
GetKeyState
GetActiveWindow
GetMessageW
OffsetRect
SetRectEmpty
SendDlgItemMessageA
GetClassLongW
IsWindowVisible
gdi32
ScaleWindowExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
SetViewportOrgEx
SetViewportExtEx
ExtTextOutW
TextOutW
SetMapMode
SaveDC
RestoreDC
RectVisible
PtVisible
CreateCompatibleDC
GetClipBox
Escape
SetTextColor
SetBkColor
GetDeviceCaps
GetStockObject
StretchBlt
SetStretchBltMode
CreateCompatibleBitmap
CreateBitmap
GetObjectW
DeleteObject
SelectObject
DeleteDC
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
QueryServiceConfigW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegQueryValueExW
OpenSCManagerW
EnumServicesStatusExW
CloseServiceHandle
RegDeleteValueW
RegQueryValueW
RegEnumKeyW
RegEnumValueW
RegDeleteKeyW
OpenServiceW
shell32
ord680
SHGetKnownFolderPath
ShellExecuteExW
SHGetSpecialFolderPathW
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsW
PathFindExtensionW
PathIsUNCW
PathStripToRootW
PathFindFileNameW
ole32
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateInstance
CoCreateGuid
oleaut32
VariantChangeType
VariantClear
VariantInit
SysAllocString
SysFreeString
wininet
InternetOpenUrlW
HttpQueryInfoW
InternetCloseHandle
InternetReadFile
InternetOpenW
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 359KB - Virtual size: 359KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 231KB - Virtual size: 231KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ