Static task
static1
Behavioral task
behavioral1
Sample
61c5f29add0ae79d94c720745b338aab870a5b32ed5dcc360b181a8bad73e9f3.exe
Resource
win7-20231129-en
General
-
Target
61c5f29add0ae79d94c720745b338aab870a5b32ed5dcc360b181a8bad73e9f3
-
Size
596KB
-
MD5
1af51b2bfe7bc0d7cc6339952d172981
-
SHA1
0e9feab06b4f7c8157b2a42a83a7f0f6401ca48d
-
SHA256
61c5f29add0ae79d94c720745b338aab870a5b32ed5dcc360b181a8bad73e9f3
-
SHA512
299e9c96dceff67c03e45495e51c8956080b52d2c7d4cc662145df94b7d5c9c07a65e83b5c7607f4072b7038306b47c99c9d2ac8a484ca046c0620b8e54fa193
-
SSDEEP
12288:zHpidNDeAM2A7ebToldhYPn3H9ueumMfeI2S9QleI+ovsUc6TlY2/wWqFn:eeAM2vbTg0bmDUcMlH2n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61c5f29add0ae79d94c720745b338aab870a5b32ed5dcc360b181a8bad73e9f3
Files
-
61c5f29add0ae79d94c720745b338aab870a5b32ed5dcc360b181a8bad73e9f3.exe windows:5 windows x86 arch:x86
032389bb37a444d0f480b6c2e4dd9897
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdiplusShutdown
GdipDeleteBrush
GdipCreateSolidFill
GdipFillRectangleI
GdiplusStartup
GdipDrawImageRectRect
GdipDeleteGraphics
GdipCreateFromHDC
GdipGetImageHeight
GdipGetImageWidth
kernel32
LoadLibraryW
FreeLibrary
GetModuleFileNameW
lstrcmpiW
RaiseException
LoadLibraryExW
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
DecodePointer
GetCommandLineW
InitializeCriticalSection
SetLastError
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetLocalTime
GetTickCount
CreateMutexW
ReleaseMutex
WaitForSingleObjectEx
CreateToolhelp32Snapshot
Process32FirstW
GetCurrentProcessId
Process32NextW
GetLongPathNameW
OpenProcess
GetShortPathNameW
Sleep
MoveFileExW
ReadFile
WriteFile
SizeofResource
GetFileSize
GetCurrentProcess
InterlockedPopEntrySList
SetStdHandle
EnterCriticalSection
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetACP
GetStdHandle
GetModuleHandleExW
ExitProcess
RtlUnwind
CreateFileA
GetSystemDirectoryW
lstrcmpiA
lstrcmpA
DeviceIoControl
QueryPerformanceCounter
GetStartupInfoW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileW
GetVersionExW
GetModuleHandleW
GetProcAddress
FindResourceExW
FindResourceW
LeaveCriticalSection
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
GetLastError
MultiByteToWideChar
WideCharToMultiByte
ReadConsoleW
SetFilePointerEx
WriteConsoleW
SetEndOfFile
LoadResource
InitializeSListHead
EncodePointer
OutputDebugStringW
IsDebuggerPresent
InterlockedPushEntrySList
LockResource
FlushFileBuffers
FlushInstructionCache
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
LoadLibraryExA
user32
SetCursor
CharNextW
DispatchMessageW
TranslateMessage
GetMessageW
OffsetRect
DefWindowProcW
DestroyWindow
UnregisterClassW
RegisterClassExW
SendMessageW
PostMessageW
SetWindowPos
PostQuitMessage
GetParent
CopyRect
UnionRect
EqualRect
PtInRect
ShowWindow
InvalidateRect
DrawFocusRect
SendMessageTimeoutW
GetWindowThreadProcessId
FindWindowExW
PeekMessageW
GetClassInfoExW
LoadCursorW
CreateWindowExW
SetWindowLongW
KillTimer
SetTimer
IsWindow
GetWindowLongW
ReleaseCapture
UpdateLayeredWindow
GetWindowRect
ReleaseDC
GetDC
GetClientRect
GetAsyncKeyState
ScreenToClient
EndPaint
BeginPaint
SetCapture
CallWindowProcW
gdi32
RectVisible
SaveDC
RestoreDC
CreateRectRgnIndirect
SelectClipRgn
GetObjectW
BitBlt
SetViewportOrgEx
SelectObject
CreateCompatibleBitmap
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
OffsetViewportOrgEx
advapi32
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegEnumValueW
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
shell32
SHCreateDirectoryExW
ord165
SHGetSpecialFolderPathW
ole32
CoTaskMemRealloc
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
oleaut32
VarUI4FromStr
shlwapi
PathAppendW
PathFileExistsW
SHSetValueW
StrStrIW
SHSetValueA
SHGetValueA
StrCmpIW
SHDeleteValueW
PathFindFileNameW
PathCombineW
SHGetValueW
PathIsRelativeW
PathIsRootW
PathRemoveFileSpecW
comctl32
_TrackMouseEvent
InitCommonControlsEx
ws2_32
WSACleanup
WSAStartup
psapi
GetModuleFileNameExW
crypt32
CertGetNameStringW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
Sections
.text Size: 357KB - Virtual size: 357KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE