Static task
static1
Behavioral task
behavioral1
Sample
c85443dcd0c95ccb7cec183762392cf3b84b618c05a0c50be58fd01d8eaa80f2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c85443dcd0c95ccb7cec183762392cf3b84b618c05a0c50be58fd01d8eaa80f2.exe
Resource
win10v2004-20231215-en
General
-
Target
c85443dcd0c95ccb7cec183762392cf3b84b618c05a0c50be58fd01d8eaa80f2
-
Size
1.5MB
-
MD5
3c10d1a2c676e85ab44cb647cc5849e1
-
SHA1
1f4f2866346b5b31787b9e9120a91c94a876c570
-
SHA256
c85443dcd0c95ccb7cec183762392cf3b84b618c05a0c50be58fd01d8eaa80f2
-
SHA512
1fc7e7ddfe2f8daabfb2b9eedf0ca920e194a52a70afff9843aa8740ce13437a4f5224033a0863060bfa4814945e2b1426ae7a774566b34cbc4670d68e0cccae
-
SSDEEP
24576:n6JGELNg9znapMQYvBrZuvzEr4e9YnHZSPI6hO:UNg9zuMQYZ9uhZSQMO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c85443dcd0c95ccb7cec183762392cf3b84b618c05a0c50be58fd01d8eaa80f2
Files
-
c85443dcd0c95ccb7cec183762392cf3b84b618c05a0c50be58fd01d8eaa80f2.exe windows:6 windows x86 arch:x86
b09096fd594bba5de0513981c35d7e17
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GlobalFlags
FileTimeToLocalFileTime
GetFileAttributesExW
GetFileSizeEx
GetFileTime
FindNextFileW
SetErrorMode
GetUserDefaultLCID
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
ReadConsoleW
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
LCMapStringW
GetConsoleMode
GetConsoleOutputCP
ExitProcess
GetStdHandle
HeapQueryInformation
GetFileType
SetStdHandle
FreeLibraryAndExitThread
ExitThread
CreateThread
GetCommandLineW
GetCommandLineA
RtlUnwind
GetStringTypeW
LCMapStringEx
GetCPInfo
CompareStringEx
GetFileInformationByHandleEx
MoveFileExW
AreFileApisANSI
SetFilePointerEx
SetFileInformationByHandle
FindFirstFileExW
CreateDirectoryW
SetCurrentDirectoryW
FormatMessageA
LocalReAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSection
GetCurrentProcess
DuplicateHandle
WriteFile
UnlockFile
SetFilePointer
SetEndOfFile
LockFile
GetVolumeInformationW
GetLocaleInfoW
GetFullPathNameW
GetFileSize
FlushFileBuffers
FindFirstFileW
FindClose
DeleteFileW
CompareStringW
GlobalFindAtomW
LoadLibraryA
GetSystemDirectoryW
EncodePointer
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
LocalAlloc
MulDiv
LocalFree
GlobalAddAtomW
ResumeThread
SuspendThread
SetThreadPriority
CreateEventW
SetEvent
GlobalFree
GlobalUnlock
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetTickCount
lstrcmpW
lstrcmpA
GlobalDeleteAtom
GlobalLock
GlobalAlloc
GetVersionExW
GetCurrentThread
GetModuleHandleA
GetACP
GetEnvironmentVariableW
FreeLibrary
LoadLibraryW
LoadLibraryExW
OutputDebugStringA
CreateFileW
GetFileAttributesW
GetModuleFileNameW
ReadFile
CreateProcessW
GetStartupInfoW
CreatePipe
Sleep
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
InitializeCriticalSectionAndSpinCount
CreateSemaphoreExW
CreateMutexExW
GetCurrentProcessId
OpenSemaphoreW
WaitForSingleObject
SetLastError
OutputDebugStringW
IsDebuggerPresent
WideCharToMultiByte
DebugBreak
GetModuleFileNameA
GetModuleHandleExW
GetProcAddress
GetModuleHandleW
GetCurrentThreadId
FormatMessageW
WaitForSingleObjectEx
ReleaseSemaphore
ReleaseMutex
CloseHandle
GetProcessHeap
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionEx
LeaveCriticalSection
HeapFree
EnterCriticalSection
WriteConsoleW
user32
GetClassLongW
SetWindowLongW
PtInRect
CopyRect
MapWindowPoints
AdjustWindowRectEx
GetWindowRect
GetWindowTextW
RemovePropW
GetPropW
SetPropW
GetScrollPos
RedrawWindow
SetForegroundWindow
GetForegroundWindow
UpdateWindow
SetMenu
GetMenu
GetCapture
SetFocus
GetDlgCtrlID
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
GetClassNameW
IsChild
IsMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
GetMessageTime
GetMessagePos
UnregisterClassW
LoadIconW
SendMessageW
SetTimer
RegisterWindowMessageW
GetSysColor
ScreenToClient
ClientToScreen
EndPaint
BeginPaint
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
UnhookWindowsHookEx
GetMenuItemCount
GetMenuItemID
GetTopWindow
GetWindow
WinHelpW
MonitorFromWindow
GetMonitorInfoW
CharUpperW
ShowWindow
SetWindowPos
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
EnableWindow
PostMessageW
SendDlgItemMessageA
SetRectEmpty
OffsetRect
GetParent
PostQuitMessage
RegisterClipboardFormatW
IsWindowEnabled
MessageBoxW
GetWindowLongW
GetWindowThreadProcessId
GetLastActivePopup
IsWindow
DestroyWindow
CreateDialogIndirectParamW
EndDialog
GetDlgItem
GetNextDlgTabItem
GetActiveWindow
SetActiveWindow
GetDesktopWindow
GetFocus
CheckMenuItem
EnableMenuItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
SetMenuItemInfoW
LoadBitmapW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
IsWindowVisible
GetKeyState
ValidateRect
GetCursorPos
SetWindowsHookExW
CallNextHookEx
SetWindowTextW
IsDialogMessageW
LoadCursorW
RealChildWindowFromPoint
KillTimer
InvalidateRect
PostThreadMessageW
GetSysColorBrush
DestroyMenu
ReleaseDC
SetCursor
GetSubMenu
GetDC
gdi32
GetStockObject
PtVisible
RectVisible
RestoreDC
SaveDC
SelectObject
SetBkColor
SetMapMode
SetTextColor
GetObjectW
TextOutW
ExtTextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
GetClipBox
Escape
DeleteObject
GetDeviceCaps
CreateBitmap
DeleteDC
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegEnumValueW
RegQueryValueW
RegEnumKeyW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegGetValueW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
EventUnregister
EventWriteTransfer
EventSetInformation
EventRegister
shell32
ShellExecuteW
shlwapi
UrlUnescapeW
PathIsUNCW
PathStripToRootW
ord12
PathFindFileNameW
PathFindExtensionW
ole32
CoRevokeClassObject
OleIsCurrentClipboard
CoInitialize
CoCreateInstance
OleUninitialize
OleInitialize
CoFreeUnusedLibraries
CoCreateGuid
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantChangeType
VariantClear
VariantInit
SysAllocString
SysFreeString
oledlg
OleUIBusyW
wininet
InternetSetStatusCallbackW
InternetGetLastResponseInfoW
InternetQueryDataAvailable
InternetWriteFile
InternetSetFilePointer
InternetReadFile
InternetOpenUrlW
InternetOpenW
InternetCanonicalizeUrlW
InternetCrackUrlW
InternetSetOptionW
InternetQueryOptionW
InternetCloseHandle
ws2_32
WSAStartup
socket
WSACleanup
htons
inet_pton
bind
closesocket
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 342KB - Virtual size: 342KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 992KB - Virtual size: 992KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ