Static task
static1
Behavioral task
behavioral1
Sample
2557db2913ce3a8f9bf59d59fda893a34d54c29caf8c531971408124257ca1f2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2557db2913ce3a8f9bf59d59fda893a34d54c29caf8c531971408124257ca1f2.exe
Resource
win10v2004-20231222-en
General
-
Target
2557db2913ce3a8f9bf59d59fda893a34d54c29caf8c531971408124257ca1f2
-
Size
4.8MB
-
MD5
cfa09ccc88959c891199c754ab6e529d
-
SHA1
312693e7e1b13f105e670b54aa267b819b19fae4
-
SHA256
2557db2913ce3a8f9bf59d59fda893a34d54c29caf8c531971408124257ca1f2
-
SHA512
cd5ceb70facce537f854bb38ea1afb3d8c217dcf974b4133fdce7f9a76a041ce6e5cea6a950c2f7e27d6fb821bb2c4185db9fbbbb0760001c4e2d965bdac28a6
-
SSDEEP
98304:msX9w4ic0cT+pQq6uw9viKU0pXwSDfL4p0HS0LoK1x+69:fEoIS+KbpZ7L4CnNT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2557db2913ce3a8f9bf59d59fda893a34d54c29caf8c531971408124257ca1f2
Files
-
2557db2913ce3a8f9bf59d59fda893a34d54c29caf8c531971408124257ca1f2.exe windows:6 windows x86 arch:x86
0ec44a9db881f3ae143dbf04b3369c19
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
kernel32
lstrcmpA
GetThreadLocale
SetThreadLocale
GetSystemInfo
SetEndOfFile
GetFileSizeEx
MoveFileExW
SetFileAttributesW
DeviceIoControl
GetFileAttributesExW
ResetEvent
SetEvent
PostQueuedCompletionStatus
GetExitCodeThread
CreateEventW
CreateIoCompletionPort
GetQueuedCompletionStatus
DecodePointer
WriteConsoleW
FlushFileBuffers
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetStdHandle
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetFileType
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
QueryPerformanceFrequency
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetSystemTimeAsFileTime
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
LCMapStringEx
GetCPInfo
GetStringTypeW
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
FindFirstFileExW
RaiseException
GetLastError
lstrlenA
GetSystemTime
GetNativeSystemInfo
GetFileSize
CreateFileA
HeapDestroy
HeapAlloc
SystemTimeToFileTime
GetWindowsDirectoryW
FileTimeToSystemTime
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetModuleFileNameW
LocalFree
DeleteFileW
WriteFile
LocalAlloc
GetCurrentProcess
K32GetModuleFileNameExW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
ReadFile
GetStartupInfoW
CreatePipe
TerminateProcess
GetExitCodeProcess
CreateProcessW
MoveFileW
RemoveDirectoryW
FindClose
FindNextFileW
FindFirstFileW
OutputDebugStringW
SetFilePointer
GetPrivateProfileStringW
GetPrivateProfileIntW
CopyFileW
lstrlenW
CreateThread
TerminateThread
WaitForSingleObject
InitializeCriticalSection
GetVersionExW
GetModuleHandleW
LoadLibraryW
GetTickCount
MulDiv
GetCurrentProcessId
OpenProcess
FreeResource
GlobalFree
GlobalAlloc
Sleep
VerSetConditionMask
VerifyVersionInfoW
WideCharToMultiByte
MultiByteToWideChar
WritePrivateProfileStringW
lstrcmpiW
LoadLibraryExW
GetProcAddress
FreeLibrary
CloseHandle
CreateFileW
CreateDirectoryW
GetVersion
GetConsoleOutputCP
user32
GetShellWindow
IsClipboardFormatAvailable
RegisterClipboardFormatW
GetSysColor
SetCaretPos
CreateCaret
GetCaretBlinkTime
wsprintfW
UpdateWindow
UpdateLayeredWindow
SetWindowPos
MoveWindow
ShowWindow
PostQuitMessage
LoadCursorW
KillTimer
SetTimer
DestroyWindow
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
SetWindowLongW
GetWindowLongW
GetDlgItem
UnregisterClassW
CallWindowProcW
SetLayeredWindowAttributes
DefWindowProcW
SendMessageW
GetIconInfo
GetDC
CharLowerBuffW
SetActiveWindow
BringWindowToTop
AttachThreadInput
GetFocus
GetClientRect
GetWindowRect
MapWindowPoints
GetParent
GetWindow
LoadIconW
MonitorFromWindow
GetMonitorInfoW
MessageBoxW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
CharNextW
SetRectEmpty
EqualRect
SetCursor
ClientToScreen
GetCursorPos
PtInRect
ScreenToClient
GetDoubleClickTime
CopyRect
IntersectRect
PostMessageW
SystemParametersInfoW
BeginPaint
EndPaint
IsIconic
InvalidateRect
GetCursor
TrackMouseEvent
SetFocus
SetCapture
ReleaseCapture
SetWindowRgn
EnableWindow
GetForegroundWindow
GetWindowTextW
SetForegroundWindow
IsWindowVisible
GetWindowThreadProcessId
GetWindowTextLengthW
SetWindowTextW
IsRectEmpty
LoadImageW
FillRect
ReleaseDC
IsZoomed
MonitorFromRect
OffsetRect
DrawTextW
gdi32
CreatePen
RestoreDC
ExtSelectClipRgn
CreateRectRgnIndirect
SaveDC
GetDeviceCaps
GetStockObject
SetBkColor
GetBitmapBits
StretchBlt
SetStretchBltMode
SetPixel
Rectangle
CreateSolidBrush
GetObjectW
SetTextColor
SetBkMode
CreateRectRgn
CombineRgn
CreateRoundRectRgn
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
DeleteObject
CreateFontIndirectW
SetBitmapBits
GetTextColor
GetCurrentObject
SetTextCharacterExtra
GetViewportOrgEx
CreateDIBSection
advapi32
RegDeleteKeyW
GetUserNameW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ConvertSidToStringSidW
LookupAccountNameW
DeleteService
CloseServiceHandle
ControlService
StartServiceW
ChangeServiceConfigW
QueryServiceConfigW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
SetSecurityDescriptorDacl
RegSetKeySecurity
InitializeSecurityDescriptor
RegEnumKeyW
CreateProcessWithTokenW
DuplicateTokenEx
OpenProcessToken
RegQueryValueExW
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
shell32
SHGetMalloc
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHBrowseForFolderW
ShellExecuteW
ord165
SHCreateDirectoryExW
ShellExecuteExW
SHChangeNotify
SHGetSpecialFolderPathW
ole32
CoInitializeSecurity
CoCreateGuid
OleRun
RegisterDragDrop
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CreateStreamOnHGlobal
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoTaskMemFree
oleaut32
SysAllocString
VarBstrCmp
VarUI4FromStr
VariantCopy
VariantClear
LoadRegTypeLi
LoadTypeLi
SysFreeString
SysStringLen
VariantInit
GetErrorInfo
shlwapi
PathIsDirectoryW
PathSearchAndQualifyW
PathRemoveBackslashW
SHDeleteValueW
SHGetValueW
StrCmpIW
PathCombineW
PathAppendW
PathRemoveFileSpecW
PathRemoveExtensionW
PathFindFileNameW
PathFileExistsW
comctl32
ord17
DrawShadowText
InitCommonControlsEx
msimg32
AlphaBlend
gdiplus
GdiplusStartup
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDrawString
GdipSetTextRenderingHint
GdipCreateSolidFill
GdipBitmapLockBits
GdipCreateBitmapFromHICON
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDrawImageRectI
GdipSetInterpolationMode
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipCreateFromHDC
GdipDisposeImage
GdipAlloc
GdipFree
GdipDeleteBrush
secur32
GetUserNameExW
crypt32
CryptBinaryToStringW
CryptStringToBinaryW
wininet
InternetReadFile
HttpQueryInfoW
InternetCrackUrlW
InternetOpenW
InternetCloseHandle
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetSetOptionW
netapi32
Netbios
iphlpapi
GetAdaptersInfo
GetIpAddrTable
Sections
.text Size: 848KB - Virtual size: 848KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22.6MB - Virtual size: 22.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ