Static task
static1
Behavioral task
behavioral1
Sample
23720ef34040a1bc967f6f783a759bfce494ae7e1370df5e7c9796ef66f3f90b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23720ef34040a1bc967f6f783a759bfce494ae7e1370df5e7c9796ef66f3f90b.exe
Resource
win10v2004-20231222-en
General
-
Target
23720ef34040a1bc967f6f783a759bfce494ae7e1370df5e7c9796ef66f3f90b
-
Size
1.6MB
-
MD5
f872bd35ebb54ce01809e2f717923ad3
-
SHA1
392486143401ed0299cb98fd8c5a45b566007d06
-
SHA256
23720ef34040a1bc967f6f783a759bfce494ae7e1370df5e7c9796ef66f3f90b
-
SHA512
ad778faafccaaf14733d3177ee4479f77fb74b603355d7f5c2c512a9f73faf152ece987d62c83ef9cee33bcbf298fac6e00e55231d24e4eabf854404610ca957
-
SSDEEP
24576:jUqB21mTgONngX9rJno81VHQmP2K08SbAS6hQBuXHYiIjjyHFniIjjyHFja:4q0sm9tPVHT2K08SznBuXHY7j27jN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23720ef34040a1bc967f6f783a759bfce494ae7e1370df5e7c9796ef66f3f90b
Files
-
23720ef34040a1bc967f6f783a759bfce494ae7e1370df5e7c9796ef66f3f90b.exe windows:6 windows x86 arch:x86
7f4bae135b7aa8f769975f4786128061
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
SetUnhandledExceptionFilter
IsBadReadPtr
GetModuleHandleW
GetCurrentProcessId
lstrlenW
GetVersionExW
Sleep
OutputDebugStringW
GetCurrentThread
LoadLibraryW
CreateProcessW
FreeLibrary
WideCharToMultiByte
ReleaseMutex
AddAtomW
GetProcAddress
GetCurrentThreadId
WaitForSingleObject
VirtualProtect
GetModuleFileNameW
GetPrivateProfileIntW
WritePrivateProfileStringW
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
FindResourceW
LoadResource
FindResourceExW
lstrcpynW
CloseHandle
HeapReAlloc
LockResource
GetLastError
FindAtomW
DeleteFileW
FindClose
DeleteAtom
FindNextFileW
FindFirstFileW
CopyFileW
TerminateThread
GetProcessTimes
GetTickCount
SystemTimeToFileTime
Process32FirstW
Process32NextW
GetPrivateProfileStringW
CreateToolhelp32Snapshot
OpenProcess
ConnectNamedPipe
GetOverlappedResult
DisconnectNamedPipe
CreateFileW
WaitForMultipleObjects
CreateNamedPipeW
WriteFile
SetNamedPipeHandleState
ReadFile
ResetEvent
SetEvent
RaiseException
GetProcessId
CreateEventW
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
MultiByteToWideChar
HeapSize
InitializeCriticalSectionEx
CreateMutexW
InitializeCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
EnterCriticalSection
HeapFree
SizeofResource
IsDebuggerPresent
GetStringTypeW
WaitForSingleObjectEx
SwitchToThread
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
QueryPerformanceCounter
QueryPerformanceFrequency
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
lstrcpyW
MulDiv
GetACP
ExitProcess
FreeResource
GetFileSize
lstrcmpW
SetEndOfFile
SetFilePointer
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetVersion
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
GetTempFileNameW
GetTempPathW
ResumeThread
GetLocalTime
IsProcessorFeaturePresent
UnhandledExceptionFilter
InitializeSListHead
GetSystemWindowsDirectoryW
LoadLibraryExW
DeviceIoControl
lstrcmpA
FlushFileBuffers
CreateThread
GetThreadTimes
FreeLibraryAndExitThread
LocalFree
RtlUnwind
GetFileAttributesExW
GetTimeZoneInformation
GetConsoleOutputCP
GetConsoleMode
GetFileType
SetFilePointerEx
ExitThread
GetModuleHandleExW
GetStdHandle
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
ReadConsoleW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
user32
CallWindowProcW
RegisterClassW
RegisterClassExW
GetClassInfoExW
ShowWindow
EnableWindow
SetPropW
GetPropW
LoadCursorW
LoadImageW
wvsprintfW
SetCursor
InflateRect
OffsetRect
IsIconic
SetWindowRgn
MessageBoxW
CharPrevW
DefWindowProcW
EndPaint
DestroyIcon
DrawIconEx
GetIconInfo
GetMessagePos
GetDlgCtrlID
DrawFocusRect
FillRect
HideCaret
ShowCaret
ClientToScreen
GetFocus
GetWindowDC
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
CreateAcceleratorTableW
InvalidateRgn
RemovePropW
FindWindowExW
IsWindowEnabled
MonitorFromWindow
GetClassNameW
GetParent
SetWindowLongW
IsRectEmpty
UnionRect
IntersectRect
MapWindowPoints
ScreenToClient
BeginPaint
CharNextW
IsZoomed
SetCaretPos
GetCaretBlinkTime
CreateCaret
GetClientRect
InvalidateRect
DrawTextW
IsWindowVisible
UpdateLayeredWindow
GetUpdateRect
ReleaseDC
GetDC
KillTimer
ReleaseCapture
SetCapture
SetRect
GetKeyState
DestroyWindow
RegisterWindowMessageW
PostMessageW
SetTimer
LoadIconW
wsprintfW
GetWindow
GetWindowLongW
GetWindowRect
SetWindowPos
GetMonitorInfoW
PtInRect
MoveWindow
SetFocus
GetCursorPos
SendMessageTimeoutW
IsWindow
FindWindowW
IsChild
CreateWindowExW
SendMessageW
DispatchMessageW
TranslateMessage
GetSysColor
GetMessageW
advapi32
RegEnumKeyExW
RegCreateKeyExW
RegSetValueExW
RegCreateKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
QueryServiceStatus
EqualSid
CloseServiceHandle
OpenSCManagerW
AllocateAndInitializeSid
OpenProcessToken
FreeSid
RegOpenKeyExW
OpenServiceW
OpenThreadToken
RegQueryValueExW
GetTokenInformation
shell32
SHGetSpecialFolderPathW
Shell_NotifyIconW
SHCreateDirectoryExW
SHFileOperationW
ord165
ord680
ShellExecuteExW
ole32
CoInitialize
OleLockRunning
CLSIDFromString
CreateStreamOnHGlobal
CoCreateInstance
CLSIDFromProgID
CoCreateGuid
shlwapi
PathAppendW
PathCombineW
PathFileExistsW
wnsprintfW
StrCpyW
StrStrIW
PathFindFileNameW
SHAutoComplete
StrCmpNIW
StrTrimA
StrStrIA
StrCmpIW
PathRemoveFileSpecW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
msimg32
AlphaBlend
GradientFill
comctl32
_TrackMouseEvent
ImageList_DrawEx
InitCommonControlsEx
ImageList_GetIconSize
ord17
gdi32
ExtTextOutW
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectW
CreatePen
DeleteDC
DeleteObject
GetStockObject
Rectangle
RestoreDC
SaveDC
SelectObject
GetTextMetricsW
GetObjectW
SetWindowOrgEx
GetDeviceCaps
CreateRoundRectRgn
CombineRgn
CreateRectRgnIndirect
GetCharABCWidthsW
GetClipBox
GetTextExtentPoint32W
SelectClipRgn
ExtSelectClipRgn
SetBkColor
SetBkMode
StretchBlt
SetStretchBltMode
SetTextColor
CreateDIBSection
SetDIBColorTable
TextOutW
BitBlt
CreateSolidBrush
GetTextColor
CreateDCW
GetDIBits
SetDIBitsToDevice
oleaut32
SysAllocStringLen
SysAllocString
SafeArrayCreate
SafeArrayPutElement
VariantInit
VariantClear
SysStringLen
SysFreeString
gdiplus
GdipGetImagePixelFormat
GdipDrawImageRectI
GdipLoadImageFromStreamICM
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipLoadImageFromFile
GdipDrawEllipseI
GdipAlloc
GdipFree
GdipCreatePath
GdipDeletePath
GdipAddPathLineI
GdipAddPathArcI
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipSetPenDashStyle
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipDrawLineI
GdipDrawRectangleI
GdipDrawPath
GdipFillEllipseI
GdipClosePathFigure
GdipCreateTexture
GdipCloneImage
GdipDisposeImage
GdipSaveImageToFile
GdipGetImageGraphicsContext
GdipGetImageWidth
GdipGetImageHeight
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipCreateBitmapFromScan0
GdipCreateHBITMAPFromBitmap
GdipCloneBitmapAreaI
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipSetInterpolationMode
GdipGraphicsClear
GdipFillPath
GdipDrawImagePointsI
GdipDrawImageRectRectI
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipAddPathArc
Sections
.text Size: 933KB - Virtual size: 933KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 217KB - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ