Static task
static1
Behavioral task
behavioral1
Sample
103eadde67af621b319eeff7a4c8836b87a6bfa06b77316f56a2100926cde5a1.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
103eadde67af621b319eeff7a4c8836b87a6bfa06b77316f56a2100926cde5a1.exe
Resource
win10v2004-20231020-en
General
-
Target
103eadde67af621b319eeff7a4c8836b87a6bfa06b77316f56a2100926cde5a1
-
Size
1.3MB
-
MD5
6014fd3e19dc7173bbb43e9973fad41b
-
SHA1
3694bd93d42e38810595b671f6ee2793b8a32405
-
SHA256
103eadde67af621b319eeff7a4c8836b87a6bfa06b77316f56a2100926cde5a1
-
SHA512
8c4a3236431e26692c6543eed1ca0011ed900f493a3c9c2641919012fcfa0098a68c7597f892908302aa6bcc3e853363a6352c08df4d621e6593dd8646f61107
-
SSDEEP
24576:FvDVe8V0Dw/6uO3kV0Ze6Pi+9ZQaTOx2z0v3bpjavk44qxTi/+N1:FL5VKw/6kV0Ze6Pi+jReHp6/4gTi/+T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 103eadde67af621b319eeff7a4c8836b87a6bfa06b77316f56a2100926cde5a1
Files
-
103eadde67af621b319eeff7a4c8836b87a6bfa06b77316f56a2100926cde5a1.exe windows:5 windows x86 arch:x86
231940fd36e5427c0334475c51fd42cb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
CM_Get_Parent
CM_Query_And_Remove_SubTreeW
kernel32
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
HeapCreate
VirtualFree
GetStdHandle
GetACP
IsValidCodePage
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
EnterCriticalSection
FindResourceA
SizeofResource
LockResource
LoadResource
VirtualProtect
GetStartupInfoA
GetCommandLineA
GetDateFormatA
GetTimeFormatA
CreateThread
ExitThread
GetSystemTimeAsFileTime
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapAlloc
HeapFree
RtlUnwind
GetCurrentDirectoryA
SetErrorMode
GlobalFlags
LocalSize
LoadLibraryExW
LoadLibraryExA
LoadLibraryW
WideCharToMultiByte
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetVersionExA
GetVersion
lstrlenA
lstrlenW
GetCPInfo
MultiByteToWideChar
FreeResource
lstrcmpiA
SetLastError
GetLastError
GetProcAddress
LoadLibraryA
GetModuleHandleA
CloseHandle
WriteFile
SetFilePointer
CreateFileA
CreateDirectoryA
GetModuleFileNameA
GetTickCount
ReleaseMutex
Sleep
SetThreadPriority
GetCurrentThread
CreateSemaphoreA
CreateProcessA
DeleteFileA
WaitForSingleObject
ReleaseSemaphore
GetDriveTypeA
CopyFileA
GetSystemDirectoryA
GetLogicalDrives
MoveFileA
FreeLibrary
SetFileAttributesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetFileSize
GetFileAttributesA
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
GetFileTime
GetFileSizeEx
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
ReadFile
GetThreadLocale
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateEventA
SuspendThread
SetEvent
ResumeThread
InterlockedDecrement
GetModuleFileNameW
lstrcmpA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
FindFirstFileA
FindNextFileA
FindClose
GetEnvironmentVariableA
GetFileAttributesExA
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
LocalFree
GetModuleHandleW
LCMapStringA
ExitProcess
GetOEMCP
CreateMutexA
GlobalAlloc
GlobalFree
QueryDosDeviceA
DeviceIoControl
TerminateProcess
user32
ReleaseCapture
LoadCursorA
SetWindowContextHelpId
MapDialogRect
CreateDialogIndirectParamA
EndDialog
CharUpperA
GetWindowThreadProcessId
GetMessageA
TranslateMessage
ValidateRect
IsWindowEnabled
MoveWindow
SetWindowTextA
GetCursorPos
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
SetScrollPos
GetScrollPos
RegisterWindowMessageA
GetMenuItemInfoA
GetSysColor
SystemParametersInfoA
IsWindowVisible
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
IsIconic
GetWindowPlacement
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
CheckMenuItem
SetWindowLongA
SetRectEmpty
PtInRect
IntersectRect
IsRectEmpty
UnregisterClassA
SetCapture
CharNextA
CopyAcceleratorTableA
InvalidateRgn
EndPaint
BeginPaint
GetWindowDC
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
GetTopWindow
DestroyIcon
DrawIconEx
DrawTextA
GetSystemMetrics
FillRect
GetSysColorBrush
IsDialogMessageA
SetRect
CopyRect
LoadBitmapA
DrawEdge
TabbedTextOutA
DrawTextExA
GrayStringA
CreateMenu
CreatePopupMenu
DeleteMenu
AppendMenuA
GetMenuItemCount
GetMenuItemID
GetMenuState
CopyIcon
GetDoubleClickTime
SetClassLongA
SetWindowRgn
SendMessageTimeoutA
DrawFrameControl
RegisterClassW
DefMDIChildProcW
DefMDIChildProcA
DefDlgProcW
ScreenToClient
DestroyMenu
GetMenuStringA
RedrawWindow
IsWindow
GetDlgCtrlID
WaitForInputIdle
EnumThreadWindows
LoadIconA
SetForegroundWindow
GetSystemMenu
GetForegroundWindow
UnregisterHotKey
RegisterHotKey
PostQuitMessage
KillTimer
SetTimer
LoadMenuA
EnableMenuItem
UpdateWindow
FindWindowA
PeekMessageA
ShowWindow
MessageBoxA
GetWindowLongA
WindowFromPoint
GetParent
GetNextDlgTabItem
GetActiveWindow
InvalidateRect
ClientToScreen
GetClientRect
GetWindowRect
SendMessageA
DrawFocusRect
DrawStateA
FrameRect
OffsetRect
InflateRect
LoadImageA
GetIconInfo
CreateIconIndirect
DefDlgProcA
DefFrameProcW
PostMessageA
SetCursor
DefFrameProcA
DefWindowProcW
IsMenu
DestroyCursor
EnableWindow
GetDesktopWindow
ReleaseDC
GetDC
ModifyMenuA
GetSubMenu
SetWindowLongW
GetWindowLongW
IsWindowUnicode
EnumWindows
EnableScrollBar
CallWindowProcW
gdi32
SetMapMode
GetClipBox
ExcludeClipRect
IntersectClipRect
LineTo
MoveToEx
SelectClipRgn
GetClipRgn
GetViewportExtEx
GetWindowExtEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
ScaleWindowExtEx
SetStretchBltMode
ExtSelectClipRgn
CreatePatternBrush
SelectPalette
GetObjectType
CreateRectRgnIndirect
CombineRgn
GetMapMode
GetCharWidthA
StretchDIBits
GetBkColor
GetTextColor
GetRgnBox
SetWindowExtEx
SetBkMode
RestoreDC
SaveDC
CreateRectRgn
DPtoLP
GetTextMetricsA
CreateFontA
CreateBitmap
SetBkColor
SetTextColor
GetStockObject
Escape
GetTextExtentPoint32A
ExtTextOutA
TextOutA
SetPixel
GetPixel
PatBlt
Ellipse
RectVisible
GetTextExtentPoint32W
DeleteDC
DeleteObject
CreateSolidBrush
BitBlt
SelectObject
CreateDIBSection
OffsetRgn
GetTextCharsetInfo
StretchBlt
SetBrushOrgEx
CreatePalette
CreateDIBitmap
Polygon
GetDIBits
CreateCompatibleDC
CreatePen
CreateFontIndirectA
PtVisible
CreateCompatibleBitmap
GetObjectA
GetDeviceCaps
GetBkMode
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
StartServiceA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
ControlService
QueryServiceStatus
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegQueryInfoKeyA
RegCloseKey
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
shell32
ShellExecuteA
ShellExecuteExA
comctl32
ImageList_GetIconSize
_TrackMouseEvent
FlatSB_GetScrollProp
ImageList_GetBkColor
ImageList_GetImageInfo
ImageList_DrawIndirect
ImageList_Destroy
shlwapi
PathFileExistsA
StrStrIA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
oledlg
ord8
ole32
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleFlushClipboard
CLSIDFromProgID
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoRegisterMessageFilter
CLSIDFromString
oleaut32
SystemTimeToVariantTime
SysStringLen
SysFreeString
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SafeArrayDestroy
OleCreateFontIndirect
SysAllocString
VariantCopy
VariantTimeToSystemTime
ws2_32
ntohl
imagehlp
ImageDirectoryEntryToData
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 216KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ