Static task
static1
Behavioral task
behavioral1
Sample
686b57a6acd4226ac72d4fecfe5f5b90.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
686b57a6acd4226ac72d4fecfe5f5b90.exe
Resource
win10v2004-20231215-en
General
-
Target
686b57a6acd4226ac72d4fecfe5f5b90
-
Size
3.2MB
-
MD5
686b57a6acd4226ac72d4fecfe5f5b90
-
SHA1
37a7aa5cb6a0c31c091d0a7e91df820a5822e2fc
-
SHA256
63ffd7d6e8b5f669be116f8aaeb8f955b12edbb35e1d59e2e5b34b6349679da7
-
SHA512
6f34716b064eb3cab442de4d6557b6d021ad540183dcd3c829792bf42aef1b056a03775fc67311480da7047919b6dc8ffe7ca3f57834393554cd81e00266d243
-
SSDEEP
49152:ls8+PaFNYFIY+FJ6M4XQpr3+YD/UuJKO+QlpWOc/9zlBIAK0UUNc24PO8PnXAyXD:lsyzYiJLrPL5ljY/9D19cVp5ZyzcDV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 686b57a6acd4226ac72d4fecfe5f5b90
Files
-
686b57a6acd4226ac72d4fecfe5f5b90.exe windows:4 windows x86 arch:x86
bf1f8ae75e05316165aae1a971759b4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceExW
FlushInstructionCache
SetEvent
CreateEventW
CreateThread
lstrcmpiA
lstrcmpA
CreateFileW
InterlockedDecrement
OutputDebugStringW
DebugBreak
lstrlenA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InterlockedIncrement
GetStartupInfoW
GetModuleHandleW
ReadFile
SetFileTime
SetFilePointer
SetEndOfFile
CreateWaitableTimerW
SetWaitableTimer
HeapDestroy
CancelWaitableTimer
IsBadReadPtr
IsBadWritePtr
TlsSetValue
GetPrivateProfileIntW
FreeResource
FindResourceW
SizeofResource
LoadResource
LockResource
MoveFileW
MultiByteToWideChar
WaitForMultipleObjects
LocalAlloc
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
GlobalAlloc
GlobalFree
OpenProcess
TerminateProcess
MoveFileExW
InterlockedExchange
RaiseException
GetTickCount
GetTempPathW
GetFileAttributesW
SetFileAttributesW
GetPrivateProfileStringW
GetLocalTime
WritePrivateProfileStringW
CreateDirectoryW
DeleteFileW
GetModuleFileNameW
WriteFile
CopyFileW
InitializeCriticalSection
GetCurrentThreadId
CreateMutexW
GetLastError
WaitForSingleObject
DeviceIoControl
GetCurrentProcess
lstrlenW
GetVersionExW
GetTempFileNameW
GetSystemTime
SystemTimeToFileTime
LoadLibraryA
WideCharToMultiByte
GetProcAddress
Sleep
CreateProcessW
CloseHandle
ResetEvent
FreeLibrary
user32
SetCapture
GetCapture
IsWindowEnabled
FillRect
DrawEdge
GetSystemMetrics
InflateRect
DrawFocusRect
OffsetRect
CreateDialogParamW
UpdateWindow
ReleaseCapture
GetSysColor
EndPaint
BeginPaint
DrawTextW
SetFocus
GetFocus
KillTimer
SetTimer
GetSystemMenu
EnableMenuItem
RedrawWindow
LoadStringW
GetWindow
SystemParametersInfoW
InvalidateRect
GetWindowTextW
GetDlgCtrlID
GetWindowRect
PtInRect
MapWindowPoints
GetParent
GetClientRect
GetMenu
AdjustWindowRectEx
IsWindow
GetDlgItem
SetWindowPos
IsDialogMessageW
CreateWindowExW
CallWindowProcW
GetWindowLongW
SetWindowLongW
GetClassInfoExW
SetCursor
SendMessageTimeoutW
LoadCursorW
ClientToScreen
GetWindowTextLengthW
LoadImageW
wsprintfW
RegisterClassExW
SendMessageW
PostQuitMessage
CharNextW
wvsprintfW
DestroyWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
IsIconic
BringWindowToTop
MessageBoxW
DefWindowProcW
ShowWindow
GetWindowDC
ReleaseDC
CharLowerW
PostMessageW
FindWindowW
GetDesktopWindow
SetWindowTextW
SetForegroundWindow
gdi32
GetBitmapBits
CreateDIBPatternBrushPt
CreateFontW
CreateCompatibleDC
DeleteDC
GetCurrentObject
CreateSolidBrush
SelectObject
SetTextColor
DeleteObject
CreateFontIndirectW
GetObjectW
SetBkMode
GetStockObject
CreateDIBSection
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegQueryValueExW
RegCloseKey
RegOpenKeyW
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
ole32
CoCreateInstance
CoTaskMemFree
CreateStreamOnHGlobal
CoInitialize
CoUninitialize
oleaut32
SysAllocStringLen
SysAllocString
SysFreeString
comctl32
ImageList_Create
ImageList_Add
ImageList_SetImageCount
_TrackMouseEvent
ImageList_Draw
ImageList_GetIconSize
InitCommonControlsEx
msimg32
AlphaBlend
shlwapi
StrStrIW
PathFileExistsW
PathAppendW
PathGetDriveNumberW
PathIsDirectoryW
SHGetValueW
SHSetValueW
SHDeleteValueW
SHGetValueA
PathIsDirectoryEmptyW
SHDeleteKeyW
PathRemoveFileSpecW
PathMatchSpecW
msvcrt
strcpy
_snprintf
memcmp
_controlfp
__set_app_type
__p__fmode
_strlwr
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
sprintf
strcat
wcslen
_wcsicmp
memset
memcpy
strlen
_wtoi
wcschr
isprint
isspace
tolower
wcsstr
wcscmp
wcsncpy
??2@YAPAXI@Z
_snwprintf
realloc
memmove
free
iswdigit
_vsnwprintf
strncpy
malloc
__CxxFrameHandler
_vsnprintf
_except_handler3
strncat
_purecall
fclose
fwrite
_wfopen
wcsrchr
_ftol
wcscat
_wcsnicmp
swscanf
wcscpy
_beginthreadex
_wtol
_ui64tow
time
wcsncat
_wtoi64
netapi32
Netbios
wininet
GetUrlCacheEntryInfoW
InternetCrackUrlW
InternetSetOptionW
InternetQueryOptionW
FtpCommandW
InternetGetLastResponseInfoW
InternetWriteFile
FtpOpenFileW
HttpEndRequestW
CreateUrlCacheEntryW
InternetReadFileExA
InternetSetStatusCallbackW
InternetSetOptionA
InternetConnectW
HttpSendRequestExW
HttpOpenRequestW
FtpGetFileSize
HttpQueryInfoW
InternetCloseHandle
CommitUrlCacheEntryW
InternetOpenW
InternetReadFile
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameW
GetModuleFileNameExW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
urlmon
ObtainUserAgentString
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ