Static task
static1
Behavioral task
behavioral1
Sample
ef12e493649f43ffcdf4716daa941a72f9525d596115c147f8811c5e8e00bee9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ef12e493649f43ffcdf4716daa941a72f9525d596115c147f8811c5e8e00bee9.exe
Resource
win10v2004-20231215-en
General
-
Target
ef12e493649f43ffcdf4716daa941a72f9525d596115c147f8811c5e8e00bee9
-
Size
1.4MB
-
MD5
4c7aebe6de86d8db784fc5323501b275
-
SHA1
bcbb2cb0c22d78542246a93bccec2c61fa0b774f
-
SHA256
ef12e493649f43ffcdf4716daa941a72f9525d596115c147f8811c5e8e00bee9
-
SHA512
6d3fe4e56527b93464be2250256c9466933b0258cfad9ef54e0df26f0889789798bfb1fc9c61d82dacbc128aab79ed4fbdcbfffa4d5113db3757e8bdc43823d8
-
SSDEEP
24576:vZeukrojve+d8lmOQ8lH+c4BOh9rwBKh/ywul+asxWs2:vAkTe+d8lTHJ9rGW/j2+aD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef12e493649f43ffcdf4716daa941a72f9525d596115c147f8811c5e8e00bee9
Files
-
ef12e493649f43ffcdf4716daa941a72f9525d596115c147f8811c5e8e00bee9.exe windows:6 windows x64 arch:x64
ce1444d915054b4e2ded192c44720156
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
wsock32
htons
getservbyname
htonl
recv
WSAAsyncSelect
inet_addr
inet_ntoa
gethostbyname
ioctlsocket
WSASetLastError
WSAGetLastError
gethostbyaddr
getservbyport
ntohs
send
gethostname
shutdown
WSACleanup
closesocket
connect
socket
WSAStartup
winmm
joyGetPosEx
mciSendStringW
joyGetDevCapsW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
comctl32
ImageList_GetIconSize
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
ImageList_ReplaceIcon
CreateStatusWindowW
psapi
GetProcessImageFileNameW
wininet
InternetCloseHandle
InternetReadFileExA
InternetReadFile
InternetOpenW
InternetOpenUrlW
shlwapi
StrCmpLogicalW
uxtheme
EnableThemeDialogTexture
SetWindowTheme
IsAppThemed
dwmapi
DwmGetWindowAttribute
kernel32
GlobalFree
GlobalUnlock
WideCharToMultiByte
GetCPInfo
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentThreadId
GetEnvironmentVariableW
IsValidCodePage
LoadLibraryW
GetLastError
OutputDebugStringW
lstrcmpiW
GetStringTypeExW
CreateThread
SetThreadPriority
GetExitCodeThread
CloseHandle
CreateMutexW
VirtualProtect
SetLastError
GetModuleHandleW
GetDiskFreeSpaceExW
GetDriveTypeW
CreateFileW
DeviceIoControl
SetVolumeLabelW
GetVolumeInformationW
GetDiskFreeSpaceW
SetEnvironmentVariableW
MultiByteToWideChar
GetFullPathNameW
GetFileAttributesW
CreateDirectoryW
ReadFile
DeleteFileW
LoadResource
LockResource
WriteFile
SizeofResource
SetCurrentDirectoryW
CompareStringOrdinal
CopyFileW
SetFileAttributesW
FindFirstFileW
FindNextFileW
FindClose
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
SetFileTime
GetFileSizeEx
MoveFileW
GlobalLock
OpenProcess
TerminateProcess
SetPriorityClass
GetProcessId
QueryDosDeviceW
EnterCriticalSection
LeaveCriticalSection
Beep
GetLocalTime
GetDateFormatW
GetTimeFormatW
GetDateFormatEx
GetTickCount64
GetSystemTime
GetSystemDefaultUILanguage
GetComputerNameW
GetCurrentDirectoryW
GetSystemWindowsDirectoryW
GetTempPathW
WaitForSingleObject
GetExitCodeProcess
WriteProcessMemory
ReadProcessMemory
GetVersionExW
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameW
SetDllDirectoryW
GetModuleHandleExW
GetShortPathNameW
CreateProcessW
FormatMessageW
CompareStringW
RemoveDirectoryW
GetCurrentProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetPrivateProfileStringW
GetPrivateProfileSectionW
GetPrivateProfileSectionNamesW
WritePrivateProfileStringW
WritePrivateProfileSectionW
SetEndOfFile
GetACP
GetFileType
GetStdHandle
SetFilePointerEx
SystemTimeToFileTime
FileTimeToSystemTime
GetFileSize
IsWow64Process
VirtualAllocEx
VirtualFreeEx
EnumResourceNamesW
LoadLibraryExW
GlobalSize
FindResourceW
SetErrorMode
Sleep
GetTickCount
MulDiv
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCommandLineA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCommandLineW
ExitProcess
HeapSize
HeapReAlloc
HeapQueryInformation
HeapFree
HeapAlloc
GetProcessHeap
FindFirstFileExW
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GlobalAlloc
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
WriteConsoleW
GetCurrentProcessId
InitializeSListHead
user32
SetWindowPos
EnumWindows
IsZoomed
IsIconic
GetLayeredWindowAttributes
SetLayeredWindowAttributes
DestroyWindow
RegisterClassExW
SystemParametersInfoW
CreateWindowExW
GetMenu
EnableMenuItem
LoadAcceleratorsW
AddClipboardFormatListener
RemoveClipboardFormatListener
LoadImageW
PostQuitMessage
CheckMenuItem
RegisterWindowMessageW
DefWindowProcW
SetForegroundWindow
MonitorFromPoint
GetSystemMenu
GetMenuItemCount
GetMenuItemID
GetSubMenu
GetMenuStringW
ExitWindowsEx
GetPropW
GetClassLongW
SetMenu
SetPropW
RemovePropW
GetSysColor
RedrawWindow
DrawTextW
SetParent
GetClassInfoExW
AdjustWindowRectEx
GetAncestor
UpdateWindow
FlashWindow
GetMessagePos
GetSysColorBrush
FillRect
GetClassLongPtrW
CallWindowProcW
CheckRadioButton
IntersectRect
GetUpdateRect
PtInRect
CreateDialogIndirectParamW
CreateAcceleratorTableW
DestroyAcceleratorTable
InsertMenuItemW
RemoveMenu
SetMenuItemInfoW
GetMenuItemInfoW
SetMenuDefaultItem
CreateMenu
CreatePopupMenu
SetMenuInfo
DestroyMenu
TrackPopupMenuEx
CopyImage
CreateIconIndirect
CreateIconFromResourceEx
DrawIconEx
EnumClipboardFormats
GetWindow
BringWindowToTop
GetQueueStatus
GetLastActivePopup
GetShellWindow
MapVirtualKeyW
VkKeyScanExW
SetWindowRgn
GetKeyboardLayoutNameW
ActivateKeyboardLayout
GetGUIThreadInfo
GetWindowTextW
mouse_event
WindowFromPoint
keybd_event
SetKeyboardState
GetKeyboardState
GetCursorPos
GetAsyncKeyState
AttachThreadInput
SendInput
UnregisterHotKey
RegisterHotKey
SendMessageTimeoutW
CharUpperW
UnhookWindowsHookEx
SetWindowsHookExW
PostThreadMessageW
IsCharAlphaNumericW
IsCharUpperW
IsCharLowerW
ToUnicodeEx
GetKeyboardLayout
CharLowerW
ReleaseDC
GetDC
DialogBoxParamW
ScrollWindow
GetSystemMetrics
GetWindowRect
GetWindowLongPtrW
SetFocus
DefDlgProcW
MoveWindow
MapWindowPoints
GetClientRect
EnableWindow
MapDialogRect
GetDlgItem
SetWindowLongPtrW
SetWindowTextW
MessageBoxW
OpenClipboard
GetClipboardData
GetClipboardFormatNameW
CloseClipboard
SetClipboardData
EmptyClipboard
PostMessageW
FindWindowW
IsChild
IsWindowVisible
SetActiveWindow
EnumChildWindows
GetLastInputInfo
LoadCursorW
GetCursorInfo
ClientToScreen
MessageBeep
GetIconInfo
GetWindowTextLengthW
InvalidateRect
AdjustWindowRect
SetDlgItemTextW
SendDlgItemMessageW
IsCharAlphaW
EndDialog
IsWindow
DispatchMessageW
TranslateMessage
ShowWindow
IsClipboardFormatAvailable
CountClipboardFormats
SetWindowLongW
ScreenToClient
GetMonitorInfoW
IsDialogMessageW
SendMessageW
IsWindowEnabled
GetWindowLongW
GetKeyState
TranslateAcceleratorW
KillTimer
PeekMessageW
GetFocus
GetClassNameW
GetWindowThreadProcessId
GetForegroundWindow
GetMessageW
SetTimer
GetParent
GetDlgCtrlID
EnumDisplayMonitors
DestroyIcon
MapVirtualKeyExW
BlockInput
CallNextHookEx
gdi32
GdiFlush
CreateDIBSection
EnumFontFamiliesExW
SetBrushOrgEx
GetObjectW
CreatePatternBrush
GetClipBox
SetBkMode
SetBkColor
GetDeviceCaps
CreateCompatibleDC
CreateFontIndirectW
GetStockObject
CreateSolidBrush
GetCharABCWidthsW
GetTextMetricsW
GetPixel
GetDIBits
SelectObject
CreateDCW
CreateFontW
CreatePolygonRgn
CreateRectRgn
CreateRoundRectRgn
CreateEllipticRgn
DeleteObject
BitBlt
CreateCompatibleBitmap
DeleteDC
GetSystemPaletteEntries
SetTextColor
advapi32
UnlockServiceDatabase
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteValueW
GetUserNameW
RegConnectRegistryW
RegCloseKey
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
CreateProcessWithLogonW
OpenSCManagerW
LockServiceDatabase
CloseServiceHandle
RegDeleteKeyExW
shell32
SHBrowseForFolderW
DragFinish
SHGetKnownFolderPath
ExtractIconW
DragQueryPoint
SHEmptyRecycleBinW
SHFileOperationW
SHGetPathFromIDListW
DragQueryFileW
SHGetDesktopFolder
SHGetMalloc
SHCreateItemFromParsingName
ShellExecuteExW
SHGetFolderPathW
Shell_NotifyIconW
ole32
CoCreateInstance
CoTaskMemFree
CLSIDFromString
OleInitialize
OleUninitialize
CoInitialize
CoUninitialize
CLSIDFromProgID
CoGetObject
StringFromGUID2
CreateStreamOnHGlobal
oleaut32
SafeArrayUnaccessData
SafeArrayDestroy
SysFreeString
GetActiveObject
SysStringLen
SafeArrayCreate
VariantClear
OleLoadPicture
SysAllocString
SafeArrayCopy
SysAllocStringLen
VariantCopyInd
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
VariantChangeType
SafeArrayLock
SafeArrayPtrOfIndex
SafeArrayUnlock
SafeArrayAccessData
SafeArrayGetElemsize
Sections
.text Size: 885KB - Virtual size: 885KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 241KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 198KB - Virtual size: 197KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ