Static task
static1
Behavioral task
behavioral1
Sample
686d46dc014ea066ed05b568eacffa901ab77f09ea65773ecd7ce8daed8b6b14.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
686d46dc014ea066ed05b568eacffa901ab77f09ea65773ecd7ce8daed8b6b14.exe
Resource
win10v2004-20231020-en
General
-
Target
566f32b6efa38db0387c3d7ddc79dcf0.bin
-
Size
518KB
-
MD5
fe90aabacf8921c5ad8b158fc7b0b0ff
-
SHA1
785891034812144cdcc4c18193fd401f3ca6d0c1
-
SHA256
55bdf35f6b6524d3b48078146b4f55aa3e3f8cd3d9c1279027be962609ee0698
-
SHA512
3f5ae1affa645a04d6d639e8dbcec8fcca99206adcedb231fb7f5c7260552095fc2dd672c77e6cab5514c1afb078e4296b1fc489f5ca2990f4cf7cfc48cde62c
-
SSDEEP
12288:4kd9oMK3bQlutEBu1QoVncMP1+5khfikgbtvSc4jVPAb7+qXq:trEQkEBtQcMbhfiTbtv4hPAXxXq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/686d46dc014ea066ed05b568eacffa901ab77f09ea65773ecd7ce8daed8b6b14.exe
Files
-
566f32b6efa38db0387c3d7ddc79dcf0.bin.zip
Password: infected
-
686d46dc014ea066ed05b568eacffa901ab77f09ea65773ecd7ce8daed8b6b14.exe.exe windows:6 windows x64 arch:x64
Password: infected
328b4ac4d1afb89d758e47d97f88032f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
magnification
MagSetWindowSource
MagUninitialize
MagSetWindowTransform
MagInitialize
wtsapi32
WTSUnRegisterSessionNotification
WTSRegisterSessionNotification
kernel32
CreateMutexW
lstrlenW
lstrcpyW
QueryPerformanceFrequency
SetEvent
CreateEventW
CreateProcessW
InitializeCriticalSection
SetEndOfFile
HeapSize
ReadConsoleW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
WaitForSingleObject
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
HeapFree
HeapAlloc
ExitProcess
WriteConsoleW
GetModuleHandleExW
lstrcatW
GetStdHandle
GetCommandLineA
GetLocalTime
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
GetCPInfo
GetLocaleInfoW
LCMapStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DecodePointer
EncodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
QueryFullProcessImageNameW
MapViewOfFileEx
CreateFileMappingW
GetSystemInfo
UnmapViewOfFile
ResetEvent
OpenEventW
GetCurrentProcess
GetCurrentThread
SetThreadPriority
GetThreadPriority
IsWow64Process
GetModuleHandleW
GetProcAddress
FindClose
FindFirstFileW
GetFileAttributesW
GetLastError
SetFileAttributesW
lstrcpynW
FreeLibrary
OpenProcess
lstrcmpiW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetFileType
SetFilePointer
ReleaseMutex
CloseHandle
lstrcmpW
GetExitCodeThread
ExitThread
GetCurrentThreadId
CreateThread
Sleep
ReadFile
GetFileSize
CreateFileW
HeapReAlloc
RtlUnwind
K32GetModuleFileNameExW
K32EnumProcessModules
OpenThread
GetCommandLineW
GetModuleHandleA
GetVersionExW
QueryPerformanceCounter
FormatMessageW
GetCurrentProcessId
OutputDebugStringW
MulDiv
LoadLibraryW
GetUserDefaultUILanguage
VerifyVersionInfoW
LoadLibraryExW
GetModuleFileNameW
GetModuleFileNameA
SetLastError
GetFullPathNameW
VerSetConditionMask
LocalFree
LocalAlloc
GetTickCount
WriteFile
FindNextFileW
GetSystemDirectoryW
user32
CreatePopupMenu
DestroyMenu
CheckMenuItem
EnableMenuItem
AppendMenuW
TrackPopupMenuEx
SetForegroundWindow
BeginPaint
EndPaint
SetLayeredWindowAttributes
GetWindowRect
IsWindowVisible
WindowFromPoint
EqualRect
CopyRect
EnumDisplayMonitors
RegisterWindowMessageW
CharUpperW
EnumDisplaySettingsExW
EnumDisplaySettingsW
EnumDisplayDevicesW
DisplayConfigGetDeviceInfo
SetWindowPos
IsWindowEnabled
KillTimer
SetTimer
ReleaseCapture
SetCapture
SetFocus
GetCursorPos
ShowWindow
DestroyWindow
IsWindow
CreateWindowExW
UnregisterClassW
RegisterClassW
PostQuitMessage
DefWindowProcW
IsIconic
PostMessageW
DispatchMessageW
TranslateMessage
GetMessageW
TrackMouseEvent
InvalidateRect
SetProcessDPIAware
UnhookWindowsHookEx
SetWindowsHookExW
CheckMenuRadioItem
GetSysColorBrush
InsertMenuItemW
TrackPopupMenu
OffsetRect
IsRectEmpty
GetMonitorInfoW
MonitorFromRect
DestroyIcon
GetWindowThreadProcessId
FindWindowExW
WaitForInputIdle
SetRectEmpty
MsgWaitForMultipleObjects
RegisterDeviceNotificationW
PeekMessageW
LoadIconW
SetWindowLongW
UpdateWindow
GetMenuItemInfoW
CreateMenu
SetMenu
GetSystemMetrics
RegisterClassExW
CloseDesktop
OpenInputDesktop
GetActiveWindow
UnregisterHotKey
RegisterHotKey
GetDesktopWindow
SetCursorPos
DialogBoxParamW
CreateDialogParamW
MoveWindow
MonitorFromPoint
GetForegroundWindow
GetAsyncKeyState
FindWindowW
SystemParametersInfoW
InflateRect
IntersectRect
SetWindowPlacement
UnhookWinEvent
SetWinEventHook
EnumWindows
SendMessageTimeoutW
PtInRect
ClientToScreen
GetPhysicalCursorPos
UnionRect
GetClassLongPtrW
IsDlgButtonChecked
CheckDlgButton
GetDlgItem
SendMessageW
wsprintfW
GetWindow
GetWindowLongW
GetClientRect
GetWindowRgnBox
IsZoomed
GetWindowPlacement
GetLayeredWindowAttributes
PostThreadMessageW
GetParent
FillRect
ReleaseDC
GetWindowDC
GetDC
GetWindowTextW
GetAncestor
LoadCursorW
SetWindowLongPtrW
GetWindowLongPtrW
MessageBoxW
CharLowerW
LoadImageW
ValidateRect
GetClassNameW
DrawIconEx
LoadStringW
ShowWindowAsync
gdi32
StretchBlt
TextOutW
MoveToEx
SetTextColor
SetBkMode
SetDCPenColor
SetDCBrushColor
RoundRect
LineTo
CreateFontIndirectW
GetTextExtentPoint32W
GetObjectW
SelectObject
DeleteObject
DeleteDC
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetStockObject
StrokeAndFillPath
GetDeviceCaps
CreatePen
BeginPath
EndPath
advapi32
GetUserNameW
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RegQueryInfoKeyW
SetEntriesInAclW
RegQueryValueExW
RegEnumKeyExW
RegEnumKeyW
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegCloseKey
RegSetValueExW
RegOpenCurrentUser
RegCreateKeyExW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
RegCopyTreeW
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
SHGetFolderPathW
Shell_NotifyIconW
SHGetSpecialFolderPathW
ExtractIconW
ExtractIconExW
ShellExecuteW
CommandLineToArgvW
SHCreateShellItemArrayFromShellItem
SHCreateItemFromParsingName
ole32
StringFromGUID2
CoInitialize
CLSIDFromString
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
shlwapi
StrRStrIW
ord487
SHCopyKeyW
StrStrIW
SHDeleteKeyW
gdiplus
GdipDeleteGraphics
GdipDrawPath
GdipFillPath
GdiplusStartup
GdiplusShutdown
GdipCreatePen2
GdipSetPenWidth
GdipLoadImageFromFile
GdipDeletePen
GdipCreatePen1
GdipClosePathFigure
GdipCreatePath
GdipStartPathFigure
GdipCreateSolidFill
GdipAddPathArcI
GdipDeleteBrush
GdipCloneBrush
GdipSetStringFormatAlign
GdipDeleteStringFormat
GdipCreateStringFormat
GdipMeasureString
GdipDrawString
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDrawImageRect
GdipFillRectangleI
GdipDrawRectangleI
GdipDrawArcI
GdipSetSmoothingMode
GdipCreateBitmapFromHICON
GdipDisposeImage
GdipAlloc
GdipFree
GdipDeletePath
GdipCloneImage
GdipCreateFromHDC
dwmapi
DwmIsCompositionEnabled
DwmGetWindowAttribute
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
api-ms-win-core-winrt-string-l1-1-0
WindowsCreateStringReference
Sections
.text Size: 627KB - Virtual size: 626KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 438KB - Virtual size: 438KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ