Static task
static1
Behavioral task
behavioral1
Sample
effd8aa42e619e61903ae1e7658572c1a77ad559519870efc6d369956982cb2f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
effd8aa42e619e61903ae1e7658572c1a77ad559519870efc6d369956982cb2f.exe
Resource
win10v2004-20231215-en
General
-
Target
effd8aa42e619e61903ae1e7658572c1a77ad559519870efc6d369956982cb2f
-
Size
119KB
-
MD5
0c4a0bc969a6527d581413681b301f64
-
SHA1
02d3e688065e32044d5aaa79964d2acc8943eecb
-
SHA256
effd8aa42e619e61903ae1e7658572c1a77ad559519870efc6d369956982cb2f
-
SHA512
703c588bf6231fe07174b92088d34dd4569e32b071df5d3f6d3ea721cb244ac1b8a47746fcbada6c599b3025d01055eaf63436bed2014c21b1216c4d8bdff8e1
-
SSDEEP
3072:B2p0tM/hWH8uo4ovVqJsMZiOBf9qCEU8nzrW18Ug:VtDevVqKw9hEUSrW18Ug
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource effd8aa42e619e61903ae1e7658572c1a77ad559519870efc6d369956982cb2f
Files
-
effd8aa42e619e61903ae1e7658572c1a77ad559519870efc6d369956982cb2f.exe windows:4 windows x64 arch:x64
59bf7fccb9369a944c884b54e5f86f19
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegGetValueW
RegOpenKeyW
RegQueryValueExW
RegSetValueExA
RegSetValueExW
gdi32
CreateFontIndirectW
DeleteObject
GetDeviceCaps
GetTextExtentPointA
GetTextExtentPointW
GetTextMetricsW
SelectObject
SetBkMode
SetTextColor
kernel32
CloseHandle
CompareStringW
CreateEventW
CreateFileW
CreateMutexW
CreateProcessW
CreateThread
DelayLoadFailureHook
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
FreeLibrary
GetCommandLineW
GetExitCodeProcess
GetFullPathNameW
GetModuleHandleW
GetOverlappedResult
GetProcAddress
GetStartupInfoW
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
IsBadStringPtrA
IsBadStringPtrW
LeaveCriticalSection
LoadLibraryW
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
QueryPerformanceFrequency
ReadDirectoryChangesW
ResolveDelayLoadedAPI
TerminateProcess
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
lstrcmpiW
ntdll
_vsnprintf
rpcrt4
UuidCreate
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
__stdio_common_vswprintf
_assert
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
_wcsicmp
exit
free
fwrite
getenv
iswspace
malloc
memcmp
memcpy
memmove
memset
realloc
strchr
strcmp
strcpy
strcspn
strlen
wcschr
wcscmp
wcscpy
wcsncmp
wcstoul
user32
AppendMenuW
BeginPaint
ChangeDisplaySettingsExW
ClientToScreen
ClipCursor
CopyIcon
CreateDesktopW
CreateIcon
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawCaptionTempW
DrawFrameControl
DrawIconEx
DrawTextW
EndPaint
EnumDisplayDevicesW
EnumDisplaySettingsExW
ExitWindowsEx
GetAncestor
GetClientRect
GetDC
GetDesktopWindow
GetForegroundWindow
GetMenuInfo
GetMenuItemCount
GetMenuItemInfoW
GetMessageW
GetProcessWindowStation
GetSystemMetrics
GetThreadDesktop
GetUserObjectInformationW
GetWindow
GetWindowLongPtrW
GetWindowRect
GetWindowThreadProcessId
InsertMenuItemW
IntersectRect
InvalidateRect
IsIconic
IsWindowEnabled
IsWindowVisible
KillTimer
LoadCursorA
LoadCursorW
LoadIconW
LoadStringW
MapWindowPoints
PaintDesktop
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterClassW
ReleaseDC
SendMessageW
SendNotifyMessageW
SetCursor
SetForegroundWindow
SetMenuInfo
SetMenuItemInfoW
SetThreadDesktop
SetTimer
SetWindowLongPtrW
SetWindowPos
SetWindowTextW
ShowWindow
SubtractRect
SystemParametersInfoW
TrackPopupMenuEx
TranslateMessage
UnregisterClassW
UpdateWindow
win32u
NtUserMessageCall
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 512B - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 568B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ