Static task
static1
Behavioral task
behavioral1
Sample
a82d1a298cc9fc111e42444b62aa2b9a3e828999826e13bf4092d0ada5070efc.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a82d1a298cc9fc111e42444b62aa2b9a3e828999826e13bf4092d0ada5070efc.exe
Resource
win10v2004-20231023-en
General
-
Target
a82d1a298cc9fc111e42444b62aa2b9a3e828999826e13bf4092d0ada5070efc
-
Size
334KB
-
MD5
0ffc33af1df0b50b787daabc4c2e2c8d
-
SHA1
90a2f1cad0f53fdeba82a7d863a2371e2ff56638
-
SHA256
a82d1a298cc9fc111e42444b62aa2b9a3e828999826e13bf4092d0ada5070efc
-
SHA512
002fda13743c9f10426edfc3f7413d724bda2507c8341133136afa87e9d1ca4ff81480baf945b4f460c935776d4b553426aee6086d497f19e6f433115f296699
-
SSDEEP
6144:i+O6+VW5Lz333W2XvXfXwwX7/yDYrYYxSR7tXF44jHPQTHmE8Y:tOwtvUcqhXG2EmK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a82d1a298cc9fc111e42444b62aa2b9a3e828999826e13bf4092d0ada5070efc
Files
-
a82d1a298cc9fc111e42444b62aa2b9a3e828999826e13bf4092d0ada5070efc.exe windows:6 windows x86 arch:x86
313b4b095b8497889e25463f64c02d75
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveExtensionW
PathRemoveFileSpecW
PathAppendW
PathFindFileNameW
PathFileExistsW
PathAddBackslashW
comctl32
_TrackMouseEvent
InitCommonControlsEx
winmm
timeGetTime
msimg32
AlphaBlend
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
GetProcAddress
LoadLibraryW
Sleep
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FindResourceW
WritePrivateProfileStringW
CreateFileMappingW
GetFullPathNameW
GetVersionExW
SetUnhandledExceptionFilter
GetCurrentProcess
GlobalMemoryStatusEx
VirtualQuery
GetModuleFileNameW
K32EnumProcessModules
K32GetModuleBaseNameW
K32GetModuleInformation
GetCurrentDirectoryW
FindResourceExW
FreeLibrary
GetLocaleInfoW
GetGeoInfoW
GetUserGeoID
GetUserDefaultUILanguage
GetSystemDefaultLangID
SetCurrentDirectoryW
GetCurrentProcessId
GetLocalTime
LocalFree
FormatMessageW
WaitForSingleObject
GetPrivateProfileStringW
CopyFileW
InterlockedIncrement
InterlockedDecrement
GetProcessHeap
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetConsoleCP
WideCharToMultiByte
SetFilePointerEx
GetFileType
HeapAlloc
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
UnhandledExceptionFilter
SetLastError
ReadConsoleW
GetConsoleMode
InitializeCriticalSectionAndSpinCount
WriteFile
GetStdHandle
HeapSize
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
HeapFree
GetCommandLineW
GetSystemTimeAsFileTime
ReadFile
RaiseException
IsProcessorFeaturePresent
IsDebuggerPresent
RtlUnwind
LoadLibraryExW
ExitThread
GetCurrentThreadId
CreateThread
ResetEvent
SetEvent
LeaveCriticalSection
EnterCriticalSection
GetLastError
SetEndOfFile
GetFileSizeEx
DeleteFileW
CreateFileW
CreateEventW
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapReAlloc
OutputDebugStringW
LCMapStringW
SetStdHandle
FlushFileBuffers
WriteConsoleW
GetStringTypeW
lstrlenW
DecodePointer
EncodePointer
user32
SetWindowTextW
PostQuitMessage
RegisterClassExW
CreateWindowExW
LoadCursorW
GetMessageW
TranslateMessage
DispatchMessageW
SendMessageW
PostMessageW
DestroyWindow
ShowWindow
LoadIconW
MessageBoxW
IsWindowVisible
PeekMessageW
MonitorFromPoint
GetWindowRect
GetGuiResources
GetMonitorInfoW
FindWindowW
SetTimer
PtInRect
ScreenToClient
GetCursorPos
SetCursor
ReleaseDC
FillRect
GetClientRect
SetWindowRgn
EndPaint
BeginPaint
GetDC
SetWindowPos
DefWindowProcW
DrawTextW
InvalidateRect
UpdateWindow
GetSystemMetrics
EnableWindow
KillTimer
gdi32
GetObjectW
GetPixel
DeleteDC
CreateRectRgn
CreateDCW
CombineRgn
GetTextExtentPoint32W
SetBkColor
CreateSolidBrush
CreateFontW
SetTextColor
SetBkMode
GetStockObject
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
SelectObject
advapi32
RegSetValueExW
RegCreateKeyExW
LookupAccountNameW
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
GetSidIdentifierAuthority
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegCreateKeyW
shell32
SHBrowseForFolderW
Shell_NotifyIconW
SHGetPathFromIDListW
SHGetMalloc
ord165
SHGetSpecialFolderPathW
CommandLineToArgvW
ole32
CoInitialize
CoTaskMemFree
CoCreateGuid
StringFromGUID2
CoCreateInstance
CreateStreamOnHGlobal
gdiplus
GdipCreateFromHDC
GdiplusShutdown
GdipCreateHBITMAPFromBitmap
GdipDrawImageRectI
GdipFillRectangleI
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipCreateBitmapFromStreamICM
GdipDisposeImage
GdipCloneImage
GdiplusStartup
GdipCreateBitmapFromStream
GdipFree
GdipAlloc
GdipDeleteGraphics
rpcrt4
UuidToStringW
RpcStringFreeW
Sections
.text Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ