Static task
static1
Behavioral task
behavioral1
Sample
74a17417785dcb5da24f399eb0ae75383c16e0e3278e1e41dff0d4369e607813.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
74a17417785dcb5da24f399eb0ae75383c16e0e3278e1e41dff0d4369e607813.exe
Resource
win10v2004-20231023-en
General
-
Target
74a17417785dcb5da24f399eb0ae75383c16e0e3278e1e41dff0d4369e607813
-
Size
676KB
-
MD5
69034feeb7c4c5ee7649eefdd31a0366
-
SHA1
1688c06b5d7724a8fdfe7525f84bf9e3ffb19022
-
SHA256
74a17417785dcb5da24f399eb0ae75383c16e0e3278e1e41dff0d4369e607813
-
SHA512
d07b37671ad4cfb4de531aeb75d5bbbcbf46f0927121dff08ba912e50c77e3882563994d1dbd8a47d37b4990c7940b69ef7bbb21fe00bc573e52d893a34b719a
-
SSDEEP
12288:YiVFT86E3L5YnFAzMRyZYe0r0O0fu0ZQN7fB80TDGs7KC2yx+5HB:z7e5IAvZYe0r0Du0ZQX80fUhq+BB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74a17417785dcb5da24f399eb0ae75383c16e0e3278e1e41dff0d4369e607813
Files
-
74a17417785dcb5da24f399eb0ae75383c16e0e3278e1e41dff0d4369e607813.exe windows:4 windows x86 arch:x86
ae9382f510a9d32a0c899d716e1ff6ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetEnvironmentStrings
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLocaleInfoW
FreeEnvironmentStringsW
GetProfileStringA
InterlockedExchange
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
SetUnhandledExceptionFilter
GetACP
HeapSize
HeapReAlloc
HeapAlloc
GetCommandLineA
GetStartupInfoA
GetLocalTime
GetSystemTime
GetTimeZoneInformation
TerminateProcess
ExitProcess
HeapFree
RaiseException
RtlUnwind
GetTickCount
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
GetShortPathNameA
GetStringTypeExA
GetVolumeInformationA
FindFirstFileA
FindClose
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SizeofResource
SetLastError
GlobalFlags
MulDiv
GetLastError
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetFullPathNameA
GetTempFileNameA
GetFileAttributesA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
GlobalAlloc
GetCurrentThread
lstrcmpA
lstrcpynA
FormatMessageA
LocalFree
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
VirtualAlloc
LoadLibraryA
GetProcAddress
VirtualFree
Sleep
OutputDebugStringA
ResetEvent
WaitForSingleObject
CreateThread
CloseHandle
IsValidLocale
CreateEventA
user32
GetSystemMenu
DeleteMenu
AppendMenuA
IsRectEmpty
SetParent
PtInRect
IsZoomed
BringWindowToTop
InvalidateRect
UnpackDDElParam
ReuseDDElParam
SetMenu
LoadMenuA
DestroyMenu
GetDesktopWindow
SetCursor
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
GetDC
ReleaseDC
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemInt
LoadIconA
PostMessageA
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetClientRect
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
IsWindowVisible
PostQuitMessage
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
GetTabbedTextExtentA
GetScrollPos
SetScrollPos
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
EnableWindow
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
SendMessageA
SetWindowLongA
FindWindowA
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
ShowOwnedPopups
PostThreadMessageA
ScrollWindow
RegisterClipboardFormatA
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetDlgItem
IsWindowEnabled
UpdateWindow
GetWindowLongA
CharUpperA
MessageBeep
GetNextDlgGroupItem
CopyAcceleratorTableA
CharNextA
DestroyIcon
GetMenuStringA
InsertMenuA
LockWindowUpdate
GetDCEx
InvertRect
SetCapture
WindowFromPoint
KillTimer
SetTimer
InflateRect
LoadStringA
GetSysColorBrush
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GetClassNameA
FillRect
SetRect
LoadCursorA
DestroyCursor
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
SetScrollRange
ValidateRect
GetCursorPos
gdi32
EndDoc
EndPage
StartPage
StartDocA
SetAbortProc
CreateDCA
CreateFontIndirectA
SaveDC
RestoreDC
SetBkMode
SetPolyFillMode
SetROP2
SetStretchBltMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
IntersectClipRect
MoveToEx
LineTo
SetTextAlign
GetCurrentPositionEx
AbortDoc
CreateRectRgn
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
CreatePatternBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetMapMode
SetRectRgn
CombineRgn
BitBlt
GetTextColor
GetBkColor
LPtoDP
GetNearestColor
GetStretchBltMode
GetPolyFillMode
GetTextAlign
GetBkMode
GetROP2
GetTextFaceA
GetWindowOrgEx
GetViewportOrgEx
CreatePen
DPtoLP
Rectangle
GetStockObject
GetDeviceCaps
CreateFontA
GetCharWidthA
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
StretchDIBits
DeleteDC
GetTextMetricsA
SelectObject
GetTextExtentPoint32A
CreateRectRgnIndirect
PatBlt
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateDIBitmap
GetTextExtentPointA
comdlg32
PrintDlgA
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
GetFileSecurityA
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegSetValueA
RegCreateKeyA
RegQueryValueA
SetFileSecurityA
RegDeleteValueA
shell32
ExtractIconA
DragQueryFileA
DragFinish
SHGetFileInfoA
comctl32
ord17
ImageList_Destroy
oledlg
ord8
ole32
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CreateILockBytesOnHGlobal
olepro32
ord253
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantTimeToSystemTime
VariantCopy
VariantChangeType
SysAllocString
SysAllocStringByteLen
SysStringLen
ws2_32
htons
WSAStartup
WSACleanup
closesocket
recv
socket
send
gethostbyname
connect
Sections
.text Size: 356KB - Virtual size: 354KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 212KB - Virtual size: 210KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ