Static task
static1
Behavioral task
behavioral1
Sample
078f839a2bff3028fdc636b72a668cbf3c6daf44c9639b7265ee83af40b5b4a6.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
078f839a2bff3028fdc636b72a668cbf3c6daf44c9639b7265ee83af40b5b4a6.exe
Resource
win10v2004-20231023-en
General
-
Target
078f839a2bff3028fdc636b72a668cbf3c6daf44c9639b7265ee83af40b5b4a6
-
Size
649KB
-
MD5
97970cd79585d85ee2172c5b42531c0e
-
SHA1
cf880493c53db1b26d62a49d1361e62e58fa915c
-
SHA256
078f839a2bff3028fdc636b72a668cbf3c6daf44c9639b7265ee83af40b5b4a6
-
SHA512
595367e64405114d1d0817e6033d45e2e3fe686ef188dc2dbd3b3c49c40f23bf53602734ffcdf8cdee3122df162f801749590365dfb6bbc66928eb92033e72f0
-
SSDEEP
12288:brKp6Oz2e4xB6s+RGHmrypvsj9gR4s5l1HLVILFL:bvOzhjxsHmrQv0gRfLSZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 078f839a2bff3028fdc636b72a668cbf3c6daf44c9639b7265ee83af40b5b4a6
Files
-
078f839a2bff3028fdc636b72a668cbf3c6daf44c9639b7265ee83af40b5b4a6.exe windows:4 windows x86 arch:x86
695b3b8524b62118341ccf2cce354a70
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
LeaveCriticalSection
RaiseException
EnterCriticalSection
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
SetErrorMode
FlushInstructionCache
SetCurrentDirectoryW
MulDiv
CopyFileW
GetCurrentThreadId
SetLastError
CreateMutexW
WritePrivateProfileStringW
MoveFileW
GetUserDefaultUILanguage
GetVersion
GetCurrentThread
GlobalAlloc
CreateThread
SetUnhandledExceptionFilter
GetCurrentProcessId
WideCharToMultiByte
InterlockedExchange
lstrlenA
GetSystemInfo
ReadFile
SetFilePointer
SetFilePointerEx
SetFileTime
WriteFile
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetModuleFileNameA
GetStdHandle
LCMapStringW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryExW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoW
SetConsoleCtrlHandler
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
ExitThread
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetStringTypeW
SetHandleCount
GetFileType
GetStartupInfoA
RtlUnwind
GetCommandLineW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
LCMapStringA
GetConsoleCP
GetConsoleMode
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetLocaleInfoW
GetModuleHandleA
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
CompareStringA
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GlobalMemoryStatusEx
GetFileSizeEx
CreateFileW
GetFileSize
GetWindowsDirectoryW
GetTempFileNameW
GetTempPathW
RemoveDirectoryW
FindClose
FindNextFileW
SetFileAttributesW
DeleteFileW
FindFirstFileW
GetStringTypeA
GetExitCodeProcess
CreateProcessW
GetCurrentProcess
GetProcAddress
GetModuleHandleW
lstrcpyW
GetLastError
GetFileAttributesW
GetModuleFileNameW
GlobalFree
CreateDirectoryW
GetSystemDirectoryW
FreeLibrary
LoadLibraryW
lstrlenW
ExitProcess
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
TerminateThread
GetTickCount
Sleep
CloseHandle
GetExitCodeThread
GetTimeZoneInformation
WaitForSingleObject
user32
ReleaseCapture
SetCapture
TrackPopupMenuEx
TrackMouseEvent
UpdateWindow
UnionRect
SetWindowRgn
GetPropW
RegisterClassW
RemovePropW
SetPropW
GetDesktopWindow
GetWindowPlacement
ClientToScreen
InflateRect
InvalidateRect
PtInRect
GetWindowDC
IsWindowEnabled
SetScrollRange
ScreenToClient
SetScrollPos
EnableWindow
IsWindowVisible
EndPaint
BeginPaint
DestroyWindow
SetCursor
SetRectEmpty
DrawTextW
GetSysColor
ReleaseDC
GetDC
GetDlgItem
GetFocus
GetWindowTextLengthW
GetWindowTextW
SubtractRect
IsRectEmpty
SetScrollInfo
AdjustWindowRectEx
IntersectRect
RegisterWindowMessageW
SetTimer
GetCursorPos
AppendMenuW
CreatePopupMenu
SendMessageTimeoutW
GetKeyState
ShowWindow
CreateWindowExW
LoadCursorW
GetClassInfoExW
RegisterClassExW
KillTimer
GetSystemMenu
EnableMenuItem
GetWindow
MonitorFromWindow
SetWindowPos
SetWindowTextW
LoadIconW
PostQuitMessage
PostMessageW
CallWindowProcW
DefWindowProcW
GetWindowLongW
SetWindowLongW
MapWindowPoints
GetClientRect
TranslateAcceleratorW
IsDialogMessageW
GetNextDlgTabItem
GetMessageW
LoadAcceleratorsW
CharNextW
SetFocus
GetParent
MoveWindow
EqualRect
GetWindowRect
OffsetRect
MonitorFromPoint
CopyRect
GetSystemMetrics
SystemParametersInfoW
GetMonitorInfoW
MonitorFromRect
IsCharAlphaW
SendMessageW
FindWindowW
MessageBoxW
IsWindow
DispatchMessageW
TranslateMessage
PeekMessageW
SetRect
UnregisterClassA
gdi32
MoveToEx
LineTo
CreateRectRgn
ExtTextOutW
OffsetRgn
CreateSolidBrush
GetDeviceCaps
SetBkColor
ExcludeClipRect
GetTextMetricsW
SetBkMode
GetStockObject
SetWindowOrgEx
CreateCompatibleBitmap
SetTextColor
CreateFontW
BitBlt
DeleteDC
SelectObject
CreateCompatibleDC
CreateDIBSection
DeleteObject
GetObjectW
advapi32
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
FreeSid
shell32
SHGetPathFromIDListW
ShellExecuteW
SHBrowseForFolderW
ord190
ord155
SHAppBarMessage
ShellExecuteExW
SHGetFolderPathW
ole32
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
VariantInit
SysAllocString
VarUI4FromStr
VariantClear
shlwapi
PathCanonicalizeW
PathIsDirectoryW
ord176
wininet
InternetReadFile
InternetQueryDataAvailable
InternetQueryOptionW
HttpOpenRequestA
HttpEndRequestW
InternetWriteFile
HttpSendRequestExW
HttpSendRequestW
InternetErrorDlg
HttpQueryInfoW
HttpAddRequestHeadersW
InternetConnectA
InternetSetOptionW
InternetOpenW
InternetCrackUrlA
InternetCloseHandle
Sections
.text Size: 425KB - Virtual size: 425KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ve_share Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ