Static task
static1
Behavioral task
behavioral1
Sample
91dd179ba38a0cf30761201cff403ebbf9abd16b159e103b7acdc86600815b49.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
91dd179ba38a0cf30761201cff403ebbf9abd16b159e103b7acdc86600815b49.exe
Resource
win10v2004-20231215-en
General
-
Target
91dd179ba38a0cf30761201cff403ebbf9abd16b159e103b7acdc86600815b49
-
Size
3.2MB
-
MD5
5786a6c19332112a9f245ed0826dbff4
-
SHA1
afc7e2c6ebdf7e25509ae7bc53c2e0f416e6a8c9
-
SHA256
91dd179ba38a0cf30761201cff403ebbf9abd16b159e103b7acdc86600815b49
-
SHA512
a51f8f1ddebfb5aa17f59219e917c953bb39c948b39b864a8ee22046cb033f46a94e5dcb33ac77742e9e7909b30277970445698633cf206916cd78c03c8710e3
-
SSDEEP
49152:82UkdUo8Ll9Cxbj+iN+bsaDMvXJMrpnZ37xFygw1L0iDbri25:8NkDxbj6a03761Rbri25
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 91dd179ba38a0cf30761201cff403ebbf9abd16b159e103b7acdc86600815b49
Files
-
91dd179ba38a0cf30761201cff403ebbf9abd16b159e103b7acdc86600815b49.exe windows:5 windows x64 arch:x64
2507640dd3f94d7cc13aad1df8f04663
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetFileTime
WriteFile
CreateDirectoryA
GetFileAttributesA
LocalFileTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
ReadFile
SetFilePointer
GetCurrentDirectoryW
FreeLibrary
SearchPathA
WritePrivateProfileStringA
DeleteFileA
GetModuleFileNameA
lstrcatA
lstrcpyA
ActivateActCtx
GetProcAddress
GetModuleHandleA
LoadLibraryA
FindFirstFileExA
GetDriveTypeA
MulDiv
GetFileInformationByHandle
DeactivateActCtx
SetLastError
MultiByteToWideChar
lstrlenW
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
CopyFileA
GlobalFree
GlobalReAlloc
lstrcmpA
lstrcmpW
lstrcpyW
GetThreadLocale
CreateActCtxW
ReleaseActCtx
GetModuleFileNameW
FreeResource
FindResourceA
GetCurrentProcessId
LoadLibraryW
CompareStringA
GetVersionExA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
SetThreadPriority
ResumeThread
SetEvent
SuspendThread
CreateEventA
VirtualProtect
GetModuleHandleW
GetLocaleInfoA
GetSystemDefaultUILanguage
ConvertDefaultLocale
GetUserDefaultUILanguage
GetCurrentThread
GetPrivateProfileIntA
GetPrivateProfileStringA
lstrcmpiA
ReplaceFileA
GetFileTime
GetTempFileNameA
GetFullPathNameA
GetDiskFreeSpaceA
GetStringTypeExA
MoveFileA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
InitializeCriticalSection
TlsAlloc
GlobalHandle
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
FileTimeToSystemTime
GlobalFlags
GetCPInfo
GetOEMCP
GetACP
FindResourceExW
GetFileAttributesExA
FileTimeToLocalFileTime
GetFileSizeEx
SetErrorMode
GetWindowsDirectoryA
GetNumberFormatA
GetTempPathA
GetProfileIntA
InitializeCriticalSectionAndSpinCount
Sleep
DecodePointer
EncodePointer
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoW
RtlLookupFunctionEntry
RtlUnwindEx
RaiseException
RtlPcToFileHeader
VirtualAlloc
SetThreadStackGuarantee
VirtualQuery
HeapReAlloc
ExitThread
CreateThread
SetStdHandle
GetFileType
ExitProcess
HeapQueryInformation
HeapSize
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
IsValidCodePage
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
LCMapStringW
GetConsoleCP
GetConsoleMode
GetStdHandle
GetStringTypeW
HeapSetInformation
GetVersion
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTimeZoneInformation
CompareStringW
WriteConsoleW
GetProcessHeap
CreateFileW
SetEnvironmentVariableA
SleepEx
VerifyVersionInfoA
VerSetConditionMask
GetSystemDirectoryA
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
GetSystemInfo
UnmapViewOfFile
CloseHandle
GetLastError
CreateFileA
lstrlenA
lstrcpynA
WaitForSingleObject
GetTickCount
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetDriveTypeW
user32
SetRect
WindowFromPoint
EndDialog
GetNextDlgTabItem
CreateDialogIndirectParamA
GetMenuItemInfoA
SystemParametersInfoA
GetAsyncKeyState
MapDialogRect
GetKeyNameTextA
MapVirtualKeyA
PostQuitMessage
ShowOwnedPopups
IsClipboardFormatAvailable
CountClipboardFormats
InSendMessage
SetParent
IsRectEmpty
CharUpperA
GetSysColorBrush
CopyAcceleratorTableA
RealChildWindowFromPoint
SetWindowRgn
UnregisterClassA
DrawIcon
EnumDisplayMonitors
SetLayeredWindowAttributes
DeleteMenu
GetSystemMenu
UnionRect
RegisterClipboardFormatA
SendNotifyMessageA
WaitMessage
LoadAcceleratorsW
CreateMenu
DrawStateA
DrawEdge
DrawFrameControl
DrawIconEx
MonitorFromPoint
EnableScrollBar
UpdateLayeredWindow
IsMenu
NotifyWinEvent
SetClassLongPtrA
DestroyAcceleratorTable
GetMenuDefaultItem
InvertRect
HideCaret
GetIconInfo
GetNextDlgGroupItem
ToAsciiEx
GetKeyboardLayout
GetKeyboardState
CreateAcceleratorTableA
OpenClipboard
SetClipboardData
CloseClipboard
EmptyClipboard
LoadImageW
SetMenuDefaultItem
CopyIcon
GetDoubleClickTime
GetUpdateRect
CharUpperBuffA
SubtractRect
FrameRect
IsCharLowerA
MapVirtualKeyExA
GetWindowRgn
TranslateAcceleratorA
TranslateMDISysAccel
BringWindowToTop
GetActiveWindow
DrawMenuBar
CreateWindowExA
DefMDIChildProcA
GetMenu
DefFrameProcA
GetDlgItem
OffsetRect
GetDlgCtrlID
GetDesktopWindow
GetMenuState
GetMessageA
GetMenuItemID
InsertMenuA
GetMenuItemCount
RemoveMenu
EnableWindow
InvalidateRect
LoadImageA
DestroyIcon
LoadAcceleratorsA
InsertMenuItemA
UpdateWindow
IsWindow
SendMessageA
IntersectRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
CheckDlgButton
RegisterWindowMessageA
LoadIconW
LoadIconA
SendDlgItemMessageA
WinHelpA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
SetFocus
SetWindowLongA
GetWindowTextA
GetForegroundWindow
SetActiveWindow
DispatchMessageA
GetTopWindow
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
GetMessageTime
GetMessagePos
PeekMessageA
MonitorFromWindow
GetMonitorInfoA
MapWindowPoints
GetWindowTextLengthA
ScrollWindow
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
SetForegroundWindow
ShowScrollBar
GetClassInfoExA
GetClassInfoA
RegisterClassA
DeferWindowPos
GetScrollInfo
SetScrollInfo
SetWindowPlacement
GetWindowPlacement
DefWindowProcA
CallWindowProcA
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
MessageBoxA
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetRectEmpty
GetSystemMetrics
GetKeyState
SetCursor
TranslateMessage
ValidateRect
UnpackDDElParam
ReuseDDElParam
LoadMenuA
GetMenuStringA
DestroyMenu
LoadCursorA
DestroyCursor
BeginDeferWindowPos
EndDeferWindowPos
SetScrollPos
GetScrollPos
IsChild
SetCapture
GetCapture
ScreenToClient
SetCursorPos
ReleaseCapture
EqualRect
InflateRect
LoadCursorW
ReleaseDC
GetDC
MessageBeep
UnhookWindowsHookEx
AdjustWindowRectEx
RedrawWindow
CopyImage
SetWindowPos
GetCursorPos
EnableMenuItem
GetSubMenu
LoadMenuW
IsZoomed
wsprintfA
GetWindow
LoadBitmapW
PtInRect
GetWindowLongA
DrawFocusRect
FillRect
CopyRect
LockWindowUpdate
GetSysColor
GetParent
PostThreadMessageA
IsIconic
PostMessageA
GetWindowRect
GetFocus
IsWindowVisible
AppendMenuA
CreatePopupMenu
ClientToScreen
KillTimer
SetTimer
GetClientRect
gdi32
CreateRectRgn
GetViewportExtEx
GetWindowExtEx
GetPixel
StartDocA
PtVisible
RectVisible
SelectClipRgn
SetLayout
CopyMetaFileA
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
SetTextColor
SetROP2
SetPolyFillMode
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateCompatibleBitmap
SetPixelV
GetTextFaceA
CreateFontIndirectA
GetTextExtentPoint32A
GetObjectA
CreateCompatibleDC
BitBlt
GetStockObject
GetDeviceCaps
StretchDIBits
GetBoundsRect
FrameRgn
FillRgn
PtInRegion
SetPaletteEntries
ExtFloodFill
GetViewportOrgEx
StretchBlt
DeleteDC
CreateFontA
GetCharWidthA
DeleteObject
GetTextMetricsA
SelectObject
PatBlt
GetTextColor
GetBkColor
CreateDCA
SetDIBColorTable
SetPixel
Rectangle
OffsetRgn
CreateRoundRectRgn
GetSystemPaletteEntries
RealizePalette
GetNearestPaletteIndex
GetPaletteEntries
CreatePalette
Polygon
Polyline
CreatePolygonRgn
GetWindowOrgEx
EnumFontFamiliesExA
GetTextCharsetInfo
EnumFontFamiliesA
CreateDIBitmap
Ellipse
LPtoDP
CreateEllipticRgn
GetMapMode
CombineRgn
SetRectRgn
CreateDIBSection
GetRgnBox
EndDoc
AbortDoc
SetAbortProc
EndPage
StartPage
DPtoLP
CreateRectRgnIndirect
CreateHatchBrush
CreateSolidBrush
CreatePen
GetObjectType
SelectPalette
CreateBitmap
CreatePatternBrush
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetLayout
Escape
ExtTextOutA
TextOutA
shell32
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetDesktopFolder
SHAppBarMessage
ShellExecuteA
SHAddToRecentDocs
SHGetFileInfoA
DragAcceptFiles
DragFinish
DragQueryFileA
odbc32
ord68
ord72
ord4
ord44
ord47
ord50
ord40
ord18
ord8
ord67
ord54
ord51
ord45
ord17
ord41
ord10
ord61
ord3
ord16
ord2
ord1
ord15
ord9
ord14
ord20
ord48
ord49
ord11
ord19
ord12
ord46
ord13
ord59
ord43
ord5
msimg32
AlphaBlend
TransparentBlt
comctl32
ImageList_DrawEx
ImageList_GetIconSize
shlwapi
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathRemoveFileSpecW
oledlg
ord4
ord11
ord3
wldap32
ord41
ord27
ord301
ord33
ord79
ord35
ord32
ord200
ord30
ord26
ord50
ord60
ord143
ord211
ord22
ord46
ws2_32
bind
ntohs
htons
setsockopt
WSAIoctl
send
select
WSAGetLastError
__WSAFDIsSet
WSASetLastError
WSAStartup
WSACleanup
getsockopt
getpeername
closesocket
socket
connect
freeaddrinfo
getaddrinfo
sendto
recvfrom
accept
listen
ioctlsocket
gethostname
htonl
ntohl
getsockname
recv
crypt32
CertFreeCertificateContext
gdiplus
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDrawImageRectI
GdipSetInterpolationMode
GdipCreateFromHDC
GdiplusShutdown
GdiplusStartup
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
GdipCreateBitmapFromStream
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipGetImageGraphicsContext
GdipDrawImageI
oleacc
LresultFromObject
AccessibleObjectFromWindow
CreateStdAccessibleObject
imm32
ImmGetOpenStatus
ImmReleaseContext
ImmGetContext
winmm
PlaySoundA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
GetJobA
comdlg32
GetFileTitleA
advapi32
RegDeleteValueA
CryptImportKey
CryptEncrypt
CryptDestroyKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
RegEnumKeyExA
RegEnumValueA
RegCloseKey
RegSetValueA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
SetFileSecurityA
GetFileSecurityA
ole32
OleTranslateAccelerator
IsAccelerator
OleCreateMenuDescriptor
CoInitialize
DoDragDrop
RegisterDragDrop
RevokeDragDrop
StgCreateDocfileOnILockBytes
OleSetClipboard
CreateItemMoniker
CoLockObjectExternal
GetRunningObjectTable
OleIsRunning
StgIsStorageFile
CreateFileMoniker
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
StgCreateDocfile
CoDisconnectObject
OleRegGetMiscStatus
OleRegEnumVerbs
CoCreateGuid
CoInitializeEx
CoUninitialize
CoCreateInstance
OleRun
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
CreateBindCtx
CoTreatAsClass
StringFromCLSID
ReadClassStg
ReadFmtUserTypeStg
OleRegGetUserType
WriteClassStg
WriteFmtUserTypeStg
SetConvertStg
CoTaskMemFree
OleGetClipboard
OleSetMenuDescriptor
CreateGenericComposite
OleGetIconOfClass
OleCreateLinkToFile
OleCreateFromFile
OleSetContainedObject
GetHGlobalFromILockBytes
OleLoad
OleCreate
OleCreateStaticFromData
OleCreateLinkFromData
OleCreateFromData
OleLockRunning
CreateStreamOnHGlobal
OleSaveToStream
WriteClassStm
OleSave
StgOpenStorage
OleDestroyMenuDescriptor
oleaut32
VarBstrFromDate
VariantInit
SysAllocString
VariantClear
SysStringLen
VariantChangeType
SysAllocStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SysFreeString
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 742KB - Virtual size: 741KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ