Static task
static1
Behavioral task
behavioral1
Sample
f6e231ca2b2ab0ffb8e6bf5b76d6da8cc3cacb91b039b6bfa46264ca2b82f5fd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f6e231ca2b2ab0ffb8e6bf5b76d6da8cc3cacb91b039b6bfa46264ca2b82f5fd.exe
Resource
win10v2004-20231215-en
General
-
Target
f6e231ca2b2ab0ffb8e6bf5b76d6da8cc3cacb91b039b6bfa46264ca2b82f5fd
-
Size
1.5MB
-
MD5
176a2c41d2c42192a56ffbaf9dee9b76
-
SHA1
6ff20a1c7fc71bb14c3a8cfc8cd119e1530778ee
-
SHA256
f6e231ca2b2ab0ffb8e6bf5b76d6da8cc3cacb91b039b6bfa46264ca2b82f5fd
-
SHA512
470d3e6d0f07567ad0c3a720c62dec61a5c4b46d2269d31809c7800e1cbd7f8bf914344f5fa29ba09191d199d1d50beec35836a76136ad756626c485d5afad4d
-
SSDEEP
24576:432Jbp3iNNP3NlU8C3aeY3b3Owl3Uhwp3g7l69RASDCVvaxhfy1gut/ArZxaT20i:fSP1K5RwKwK7l69rKa10Nob
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6e231ca2b2ab0ffb8e6bf5b76d6da8cc3cacb91b039b6bfa46264ca2b82f5fd
Files
-
f6e231ca2b2ab0ffb8e6bf5b76d6da8cc3cacb91b039b6bfa46264ca2b82f5fd.exe windows:4 windows x86 arch:x86
df842c8e0d286735f55f31fe28b18736
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
ImageList_GetImageInfo
ImageList_GetIconSize
ImageList_GetBkColor
ImageList_DrawIndirect
ImageList_Destroy
FlatSB_GetScrollProp
_TrackMouseEvent
kernel32
GlobalAddAtomW
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomW
GlobalFlags
GlobalFree
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsValidCodePage
LCMapStringA
LCMapStringW
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalReAlloc
LocalSize
LockFile
LockResource
lstrcmpA
lstrcmpW
lstrlenA
lstrlenW
MapViewOfFile
MulDiv
MultiByteToWideChar
GetWindowsDirectoryW
RaiseException
ReadFile
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetThreadExecutionState
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnlockFile
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
WritePrivateProfileStringW
DeleteFileW
GetLastError
RemoveDirectoryW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
OpenProcess
GetCommandLineA
GetConsoleMode
GetVolumeInformationW
GetVersionExW
GetVersionExA
GetTimeZoneInformation
GetThreadLocale
GetSystemInfo
GetStringTypeW
GetStringTypeA
GetStdHandle
GetStartupInfoW
GetStartupInfoA
GetProcessHeap
GetProcAddress
GetOEMCP
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLogicalDriveStringsW
GetLocalTime
GetLocaleInfoW
GetLocaleInfoA
GetFullPathNameW
GetFileType
GetFileTime
GetFileAttributesW
GetEnvironmentStringsW
GetDriveTypeW
GetDiskFreeSpaceExW
GetCurrentThread
GetCurrentProcess
GetCPInfo
GetConsoleOutputCP
GetConsoleCP
GetACP
FreeResource
FreeLibrary
FreeEnvironmentStringsW
FormatMessageW
FlushFileBuffers
FindResourceW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExitProcess
EnumResourceTypesW
EnumResourceNamesW
EnumResourceLanguagesW
DuplicateHandle
DeviceIoControl
DeleteCriticalSection
ReleaseMutex
CreateThread
CreateProcessW
CreateFileW
CreateFileMappingW
CreateFileA
ConvertDefaultLocale
CompareStringW
CompareStringA
CloseHandle
GetCommandLineW
CreateMutexW
user32
LoadIconW
LoadImageW
LoadMenuW
LookupIconIdFromDirectoryEx
MapDialogRect
MapWindowPoints
MessageBeep
ModifyMenuW
MoveWindow
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
PtInRect
RegisterClassA
RegisterClassW
RegisterClipboardFormatW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
RemovePropW
ScreenToClient
SendDlgItemMessageA
SendDlgItemMessageW
SendMessageTimeoutW
SendMessageW
SetActiveWindow
SetCapture
SetClassLongW
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemBitmaps
SetPropW
SetRect
SetRectEmpty
SetScrollInfo
SetScrollPos
SetTimer
SetWindowContextHelpId
SetWindowLongA
SetWindowLongW
SetWindowPos
SetWindowRgn
SetWindowsHookExW
SetWindowTextW
ShowWindow
SystemParametersInfoA
SystemParametersInfoW
TabbedTextOutW
TranslateMessage
UnhookWindowsHookEx
UnregisterClassW
UpdateWindow
ValidateRect
WinHelpW
InvalidateRect
IntersectRect
InflateRect
GrayStringW
GetWindowThreadProcessId
GetWindowTextW
GetWindowTextLengthW
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindowLongA
GetWindowDC
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSubMenu
LoadCursorW
GetScrollInfo
GetPropW
GetParent
GetNextDlgTabItem
GetNextDlgGroupItem
GetMessageW
GetMessageTime
GetMessagePos
GetMenuState
GetMenuItemCount
GetMenuCheckMarkDimensions
GetLastActivePopup
GetKeyState
GetIconInfo
GetForegroundWindow
GetFocus
GetDoubleClickTime
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
GetClassNameW
GetClassLongW
GetClassInfoW
GetClassInfoExW
GetCapture
GetActiveWindow
FillRect
ExitWindowsEx
EqualRect
EnumWindows
EndPaint
EndDialog
EnableWindow
EnableScrollBar
EnableMenuItem
DrawTextW
DrawTextExW
DrawStateW
DrawIconEx
DrawIcon
DrawFrameControl
DrawFocusRect
MessageBoxW
AdjustWindowRectEx
AppendMenuW
BeginPaint
CallNextHookEx
CallWindowProcA
DrawEdge
DispatchMessageW
DestroyWindow
DestroyMenu
DestroyIcon
DefWindowProcW
DefWindowProcA
DefMDIChildProcW
DefMDIChildProcA
DefFrameProcW
DefFrameProcA
DefDlgProcW
DefDlgProcA
CreateWindowExW
CreateIconIndirect
CreateIconFromResourceEx
LoadBitmapW
KillTimer
IsWindowVisible
IsWindowUnicode
IsWindowEnabled
CallWindowProcW
CharNextW
CharUpperW
CheckMenuItem
ClientToScreen
CopyAcceleratorTableW
CopyIcon
CopyRect
CreateDialogIndirectParamW
IsRectEmpty
IsIconic
IsDialogMessageW
IsChild
GetScrollPos
InvalidateRgn
GetMenuItemID
gdi32
ExcludeClipRect
ExtSelectClipRgn
ExtTextOutW
GetBkColor
GetClipBox
GetClipRgn
GetDeviceCaps
GetDIBits
GetMapMode
GetObjectType
GetObjectW
GetPixel
GetRgnBox
GetStockObject
GetTextCharsetInfo
GetTextColor
GetTextExtentPoint32W
GetViewportExtEx
Escape
IntersectClipRect
OffsetRgn
OffsetViewportOrgEx
PatBlt
Polygon
PtVisible
RectVisible
RestoreDC
SaveDC
ScaleViewportExtEx
ScaleWindowExtEx
SelectClipRgn
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetBrushOrgEx
SetMapMode
SetStretchBltMode
SetTextColor
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
StretchDIBits
TextOutW
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgnIndirect
CreateRectRgn
CreatePen
CreatePatternBrush
CreatePalette
CreateFontIndirectW
CreateDIBSection
CreateDIBitmap
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
CombineRgn
GetWindowExtEx
BitBlt
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
comdlg32
GetFileTitleW
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegQueryValueW
RegQueryValueExW
RegOpenKeyW
RegOpenKeyExW
RegEnumKeyW
RegCloseKey
shell32
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
CommandLineToArgvW
ole32
CreateILockBytesOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
OleFlushClipboard
CoGetClassObject
CoFreeUnusedLibraries
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleIsCurrentClipboard
OleInitialize
OleUninitialize
StgCreateDocfileOnILockBytes
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
shlwapi
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathFileExistsW
PathFindExtensionW
msvcrt
_except_handler3
_exit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_XcptFilter
Sections
.text Size: 752KB - Virtual size: 749KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 324KB - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_stack_4 Size: 399KB - Virtual size: 400KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE