Static task
static1
Behavioral task
behavioral1
Sample
d4d879d67a3f8ce980e45ff4e4187c700966985f0ec9fb6c5e141ada9a437ea1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d4d879d67a3f8ce980e45ff4e4187c700966985f0ec9fb6c5e141ada9a437ea1.exe
Resource
win10v2004-20231215-en
General
-
Target
d4d879d67a3f8ce980e45ff4e4187c700966985f0ec9fb6c5e141ada9a437ea1
-
Size
1.1MB
-
MD5
eb8bd308847ce425df2ef02edaea6747
-
SHA1
4d702c41c1ca0ba78777c8eb91d2fbf6cdd633be
-
SHA256
d4d879d67a3f8ce980e45ff4e4187c700966985f0ec9fb6c5e141ada9a437ea1
-
SHA512
90be9e1d95d8d637203009fda790035b33692c72b6129736f8c65d5e23603130b641aed6010bc985e050a4918600595fd21c90c9884c31286fc9d1594feca7fb
-
SSDEEP
24576:0IsKZsEaup8By/zkgu6osmffwCwnI4kJTHB3odjrVVA9+:EExp8By/zkgrosegIhT3odnE+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4d879d67a3f8ce980e45ff4e4187c700966985f0ec9fb6c5e141ada9a437ea1
Files
-
d4d879d67a3f8ce980e45ff4e4187c700966985f0ec9fb6c5e141ada9a437ea1.exe windows:5 windows x86 arch:x86
073aeb95ecddd511167432b26767aa2b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringA
GetModuleFileNameA
GetModuleHandleExA
OutputDebugStringW
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetEnvironmentVariableA
WriteConsoleW
FlushFileBuffers
SetStdHandle
SetFilePointerEx
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetStdHandle
GetOEMCP
IsValidCodePage
HeapSize
GetModuleHandleExW
SetEndOfFile
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
LoadLibraryExW
ExitThread
CreateSemaphoreW
GetStartupInfoW
CreateEventW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetTimeZoneInformation
MoveFileExW
AreFileApisANSI
IsProcessorFeaturePresent
IsDebuggerPresent
GetCommandLineW
HeapReAlloc
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
GetStringTypeW
GetCurrentThread
GlobalUnlock
GlobalLock
GlobalAlloc
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
GetLocalTime
DosDateTimeToFileTime
SystemTimeToFileTime
DuplicateHandle
SetFileTime
SetFilePointer
GetFileType
GetCurrentProcess
MulDiv
GetFileSize
WriteFile
ExitProcess
FreeResource
GetCurrentDirectoryW
LoadLibraryW
GetTickCount
GetACP
CreateMutexW
DeleteFileW
GetFileAttributesW
CreateFileW
CreateDirectoryW
FindResourceW
ReadFile
SizeofResource
LoadResource
Sleep
SetLastError
CreateThread
GetProcessHeap
HeapFree
HeapAlloc
LockResource
WideCharToMultiByte
MultiByteToWideChar
Process32NextW
Process32FirstW
GetUserDefaultUILanguage
CreateToolhelp32Snapshot
GetDiskFreeSpaceExW
GetPrivateProfileSectionW
GetPrivateProfileStringW
GetModuleHandleW
CreateProcessW
GetModuleFileNameW
LoadLibraryA
lstrcpyW
lstrcmpW
CloseHandle
WaitForSingleObject
ResumeThread
GetLastError
TerminateProcess
OpenProcess
EnumSystemLocalesW
GetProcAddress
user32
DefWindowProcW
CallWindowProcW
RegisterClassW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
IsWindow
SetWindowPos
IsIconic
SetFocus
EnableWindow
GetSystemMetrics
GetMenu
SetPropW
GetPropW
GetClientRect
GetWindowRect
AdjustWindowRectEx
GetWindowLongW
SetWindowLongW
GetParent
GetWindow
LoadCursorW
LoadImageW
MonitorFromWindow
GetMonitorInfoW
wvsprintfW
SetCursor
UnionRect
OffsetRect
DestroyWindow
CharNextW
GetActiveWindow
GetFocus
ClientToScreen
GetSysColor
MoveWindow
CreateAcceleratorTableW
PostMessageW
ShowWindow
MessageBoxW
KillTimer
SetTimer
CharLowerA
IsWindowVisible
PostQuitMessage
wsprintfW
GetGUIThreadInfo
SetCapture
ReleaseCapture
GetDC
ReleaseDC
BeginPaint
EndPaint
GetUpdateRect
InvalidateRect
GetCursorPos
ScreenToClient
MapWindowPoints
IntersectRect
IsRectEmpty
PtInRect
IsZoomed
SetWindowRgn
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
GetCaretBlinkTime
GetCaretPos
CharPrevW
DrawTextW
FillRect
SetRect
CreateCaret
InvalidateRgn
ShowCaret
HideCaret
SendMessageW
DispatchMessageW
TranslateMessage
GetMessageW
FindWindowW
GetKeyState
SetForegroundWindow
SetCaretPos
gdi32
CreatePenIndirect
CreateCompatibleBitmap
GetObjectA
GetDeviceCaps
GdiFlush
ExtTextOutW
TextOutW
MoveToEx
CreateDIBSection
SetStretchBltMode
StretchBlt
SetBkColor
ExtSelectClipRgn
SelectClipRgn
RoundRect
LineTo
GetTextExtentPoint32W
GetClipBox
GetCharABCWidthsW
CreateRectRgnIndirect
BitBlt
CombineRgn
SetTextColor
SetBkMode
CreateSolidBrush
CreatePatternBrush
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
SelectObject
SaveDC
RestoreDC
Rectangle
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateCompatibleDC
shell32
ShellExecuteW
ShellExecuteExW
SHGetPathFromIDListW
ord165
SHGetSpecialFolderLocation
SHCreateDirectoryExW
SHBrowseForFolderW
ole32
CoInitialize
CoCreateInstance
CoTaskMemFree
CoUninitialize
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CreateStreamOnHGlobal
CoCreateGuid
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
advapi32
RegCloseKey
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
RegOpenKeyExW
gdiplus
GdipAlloc
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDrawString
GdipGetFamily
GdipDeleteFont
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipDeleteFontFamily
GdipDrawImageRectI
GdipDrawImage
GdipGraphicsClear
GdipSetInterpolationMode
GdipSetTextRenderingHint
GdipSetPixelOffsetMode
GdipSetSmoothingMode
GdipSetCompositingQuality
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdipCreateLineBrushI
GdipDeleteBrush
GdipCloneBrush
GdiplusShutdown
GdiplusStartup
GdipFree
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
comctl32
ImageList_Create
ord17
_TrackMouseEvent
imm32
ImmGetContext
ImmSetCompositionFontW
ImmSetCompositionWindow
ImmReleaseContext
ws2_32
recv
send
connect
inet_addr
htons
setsockopt
socket
gethostbyname
closesocket
wininet
InternetOpenW
InternetConnectA
InternetCloseHandle
HttpQueryInfoW
HttpQueryInfoA
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetReadFile
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
winhttp
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpSetOption
WinHttpConnect
WinHttpCloseHandle
WinHttpOpen
WinHttpQueryDataAvailable
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpReadData
shlwapi
PathFindFileNameA
PathFindFileNameW
PathFileExistsW
StrToIntW
Sections
.text Size: 737KB - Virtual size: 736KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ