Static task
static1
Behavioral task
behavioral1
Sample
d5b139ac07be4142bf8d08c0361cbcf476aaa6e5843ce2fcaa1bec6d6a026872.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
d5b139ac07be4142bf8d08c0361cbcf476aaa6e5843ce2fcaa1bec6d6a026872.exe
Resource
win10v2004-20231023-en
General
-
Target
d5b139ac07be4142bf8d08c0361cbcf476aaa6e5843ce2fcaa1bec6d6a026872
-
Size
1.0MB
-
MD5
f3053c9ad88afc35522cc235b2b52dab
-
SHA1
eb37bb355c834f6bfb31eef8f0f7fab14596f5d3
-
SHA256
d5b139ac07be4142bf8d08c0361cbcf476aaa6e5843ce2fcaa1bec6d6a026872
-
SHA512
29fbd493cfe7baaceb44bb44f1af11773c4c3b03ccb7325d637430b8f9cabf1d16e69e29bf2172f85da4a35dfbce7f0926a13f3b6728410eb25fe0ac0346b39c
-
SSDEEP
24576:JdPuNgC18loTWIgLYeuQaTjCjsyYPDsseHtHwKrinMMMMMM+v:PuWu8CDgLYOsTHMMMMMM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5b139ac07be4142bf8d08c0361cbcf476aaa6e5843ce2fcaa1bec6d6a026872
Files
-
d5b139ac07be4142bf8d08c0361cbcf476aaa6e5843ce2fcaa1bec6d6a026872.exe windows:5 windows x86 arch:x86
7afeffeb29069dfd84b5edb8c77245fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
ImageList_ReplaceIcon
ord8
CreateStatusWindowW
ImageList_Destroy
ImageList_Create
ImageList_Remove
ImageList_AddMasked
ImageList_Add
PropertySheetW
shlwapi
SHAutoComplete
kernel32
WriteFile
GetDriveTypeA
GetDiskFreeSpaceA
GetVolumeInformationA
GetFileAttributesA
SetFileAttributesA
SetFileAttributesW
MoveFileA
DeleteFileW
DeleteFileA
RemoveDirectoryA
RemoveDirectoryW
DeviceIoControl
CreateDirectoryA
CreateDirectoryW
GetCurrentDirectoryA
ExpandEnvironmentStringsW
FindNextFileA
FindFirstFileA
GetDiskFreeSpaceW
Sleep
GetVersionExW
CompareFileTime
FindCloseChangeNotification
FindFirstChangeNotificationW
GetLocaleInfoW
GetNumberFormatW
CreateThread
ExitThread
GetProcessAffinityMask
SetEvent
ResetEvent
WaitForMultipleObjects
CreateEventW
GetFullPathNameA
GetFullPathNameW
GetModuleFileNameA
GetCompressedFileSizeW
FindResourceW
SizeofResource
LoadResource
LoadLibraryExW
UpdateResourceW
EnumResourceLanguagesW
EndUpdateResourceW
EnumResourceNamesW
BeginUpdateResourceW
CompareStringA
SetThreadPriority
GetCurrentThread
SetPriorityClass
SetCurrentDirectoryA
WideCharToMultiByte
CompareStringW
IsDBCSLeadByte
GetCPInfo
GlobalMemoryStatus
GetVolumeInformationW
GetLogicalDrives
SetCurrentDirectoryW
GetStdHandle
SuspendThread
GetSystemTimeAsFileTime
GetDateFormatA
GetTimeFormatA
GetLocalTime
GetThreadPriority
GetPriorityClass
SetErrorMode
GetCommandLineW
GetCurrentProcessId
MulDiv
FindNextChangeNotification
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LoadLibraryA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
GetVersion
HeapSize
GetConsoleMode
GetConsoleCP
SetHandleCount
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
ExitProcess
GetModuleHandleA
HeapCreate
VirtualAlloc
VirtualFree
DeleteCriticalSection
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
GetCommandLineA
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
RaiseException
RtlUnwind
HeapReAlloc
HeapFree
HeapAlloc
ReadFile
CreateFileA
GetFileType
GetFileTime
SetFilePointer
FlushFileBuffers
SetEndOfFile
SetFileTime
BackupSeek
BackupRead
CreateFileW
GetCurrentProcess
FormatMessageW
LocalFree
GetCurrentDirectoryW
CreateMutexW
ReleaseMutex
GetLastError
GlobalSize
GetProcessHeap
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MultiByteToWideChar
GetVersionExA
GetTickCount
GetSystemTime
SystemTimeToFileTime
CreateFileMappingW
WaitForSingleObject
OpenFileMappingW
MapViewOfFile
CloseHandle
UnmapViewOfFile
GetTempPathW
MoveFileW
GetModuleFileNameW
FindNextFileW
LoadLibraryW
CopyFileW
GetCurrentThreadId
FreeLibrary
LocalFileTimeToFileTime
GetTempPathA
ExpandEnvironmentStringsA
GetDriveTypeW
FileTimeToDosDateTime
FindFirstFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetTimeFormatW
GetDateFormatW
FindClose
DosDateTimeToFileTime
GetFileAttributesW
GetModuleHandleW
GetProcAddress
SetLastError
SetEnvironmentVariableA
ResumeThread
user32
IsChild
GetLastActivePopup
GetClipboardData
GetMenuItemID
PostQuitMessage
SetMenu
InsertMenuW
LoadMenuW
RegisterClassW
LoadAcceleratorsW
GetMenuState
IsDialogMessageW
SetPropW
FindWindowW
GetForegroundWindow
RegisterWindowMessageW
FindWindowExW
EnumWindows
CreateIcon
GetDlgItemTextA
SetDlgItemTextA
FlashWindow
ValidateRect
GetSysColor
CopyImage
FillRect
ExitWindowsEx
CharUpperA
CharLowerA
DrawIconEx
LoadStringW
GetWindow
SetMenuItemInfoW
RedrawWindow
GetComboBoxInfo
PostThreadMessageW
IsCharAlphaW
CharLowerW
OpenClipboard
EmptyClipboard
SetClipboardData
CharToOemA
CloseClipboard
MessageBeep
PeekMessageW
CharUpperW
GetFocus
SetForegroundWindow
EnableMenuItem
MoveWindow
CheckMenuItem
LoadBitmapW
InsertMenuItemW
BeginPaint
GetClientRect
EndPaint
SetTimer
KillTimer
UpdateWindow
IsWindow
SetWindowTextW
GetWindowTextLengthW
AppendMenuW
DrawMenuBar
GetMenu
GetSubMenu
DeleteMenu
GetMenuItemCount
GetMenuItemInfoW
CharToOemBuffW
ScreenToClient
ClientToScreen
CreateDialogParamW
SetScrollPos
ScrollWindowEx
PtInRect
LoadIconW
SetScrollRange
GetDialogBaseUnits
CreateDialogIndirectParamW
GetPropW
RemovePropW
GetSystemMenu
BringWindowToTop
SetWindowPlacement
GetMessageW
TranslateMessage
DispatchMessageW
GetIconInfo
CreateIconIndirect
IsCharUpperW
TranslateAcceleratorW
SendMessageW
SetFocus
CreateWindowExW
DestroyWindow
GetWindowTextW
DefWindowProcW
SetDlgItemTextW
CreatePopupMenu
SetWindowLongW
TrackPopupMenu
DestroyMenu
CallWindowProcW
RegisterClipboardFormatW
GetKeyState
LoadCursorW
SetCursor
WindowFromPoint
GetWindowThreadProcessId
GetDC
ReleaseDC
GetDesktopWindow
GetCursorPos
GetMonitorInfoW
GetWindowLongW
ShowWindow
EnableWindow
IntersectRect
IsIconic
GetWindowPlacement
GetSystemMetrics
IsWindowEnabled
SetDlgItemInt
GetDlgItemInt
IsDlgButtonChecked
EnumChildWindows
GetClassNameW
GetWindowRect
MapWindowPoints
SetWindowPos
InvalidateRect
GetParent
CheckDlgButton
PostMessageW
MessageBoxW
IsWindowVisible
OemToCharBuffA
CharToOemBuffA
DialogBoxParamW
SendDlgItemMessageW
DestroyIcon
GetDlgItem
OemToCharA
EndDialog
GetDlgItemTextW
LoadImageW
gdi32
GetDeviceCaps
LineTo
MoveToEx
DPtoLP
SetPixel
CreatePatternBrush
TextOutA
StretchBlt
GetMapMode
SetMapMode
Rectangle
CreateCompatibleBitmap
GetTextExtentPoint32W
SetBkColor
ExtTextOutW
BitBlt
GetObjectW
CreateCompatibleDC
GetPixel
DeleteDC
CreatePen
CreateSolidBrush
SetTextColor
TextOutW
Polygon
Polyline
SelectObject
GetTextFaceW
GetTextMetricsW
CreateFontW
CreateBitmap
DeleteObject
comdlg32
GetOpenFileNameW
GetSaveFileNameW
CommDlgExtendedError
ChooseFontW
advapi32
LookupPrivilegeValueW
OpenProcessToken
SetFileSecurityA
SetFileSecurityW
GetSecurityDescriptorLength
GetFileSecurityA
GetFileSecurityW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
IsTextUnicode
RegEnumValueW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
AdjustTokenPrivileges
shell32
SHAddToRecentDocs
FindExecutableW
DragFinish
DragQueryFileW
DragAcceptFiles
Shell_NotifyIconW
ShellExecuteW
SHGetPathFromIDListA
SHGetFileInfoW
SHFileOperationW
ShellExecuteExW
SHGetMalloc
SHBrowseForFolderW
SHChangeNotify
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ole32
OleUninitialize
OleInitialize
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
OleSetClipboard
DoDragDrop
CoInitializeEx
Sections
.text Size: 737KB - Virtual size: 737KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 338KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 177KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 58KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE