Static task
static1
Behavioral task
behavioral1
Sample
b362222fff9865eaeaa06edb89d2aa9d619c6e3dc39281b737ece9a24513e4e4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b362222fff9865eaeaa06edb89d2aa9d619c6e3dc39281b737ece9a24513e4e4.exe
Resource
win10v2004-20240221-en
General
-
Target
b362222fff9865eaeaa06edb89d2aa9d619c6e3dc39281b737ece9a24513e4e4
-
Size
1.8MB
-
MD5
ee385913430ab392424fc8d08f44ebf8
-
SHA1
fa9280a6175f810956cf444236a4668636326b39
-
SHA256
b362222fff9865eaeaa06edb89d2aa9d619c6e3dc39281b737ece9a24513e4e4
-
SHA512
4d623b7b2a0725ff7c03cec1ec962624b49b6537be4cd76d0d23c399499c8c5951534b0c67d184b9533b35cfa2c880a00f394b35c0499a5f0bee333bf5d8b8d9
-
SSDEEP
24576:ZMLZUWrlj7RGBVBQIrrdrMW8NDJGu87EsVLJ:OLZUW5j7+QAdC5JGu87zD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b362222fff9865eaeaa06edb89d2aa9d619c6e3dc39281b737ece9a24513e4e4
Files
-
b362222fff9865eaeaa06edb89d2aa9d619c6e3dc39281b737ece9a24513e4e4.exe windows:4 windows x64 arch:x64
4652199cb64ef3ced68c39d0c54758f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetFileAttributesA
GetFileTime
RtlLookupFunctionEntry
RtlUnwindEx
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlCaptureContext
RaiseException
RtlPcToFileHeader
GetSystemTimeAsFileTime
GetDateFormatA
GetTimeFormatA
HeapAlloc
HeapFree
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
FlsGetValue
FlsSetValue
FlsFree
FileTimeToLocalFileTime
RtlVirtualUnwind
GetACP
IsValidCodePage
GetStdHandle
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
HeapSetInformation
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
SetErrorMode
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
GetThreadLocale
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
TlsGetValue
LocalAlloc
GlobalFlags
GetModuleFileNameW
FileTimeToSystemTime
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
lstrcmpA
WaitForSingleObject
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetModuleHandleA
GetVersionExA
SetLastError
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
lstrlenA
CompareStringW
CompareStringA
GetVersion
MultiByteToWideChar
LoadLibraryExA
SetUnhandledExceptionFilter
CreateFileA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
CloseHandle
GetLastError
FreeLibrary
ExitProcess
LoadLibraryA
GetProcAddress
GetTickCount
OutputDebugStringA
Sleep
GetLocalTime
InitializeCriticalSection
GetPrivateProfileStringA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
FlsAlloc
SizeofResource
user32
CopyAcceleratorTableA
IsRectEmpty
SetRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
GetDlgItemInt
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
CharNextA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
GetWindowLongPtrA
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
CopyRect
PtInRect
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
DestroyMenu
SetWindowContextHelpId
MapDialogRect
GetClassLongPtrA
GetWindowThreadProcessId
EndDialog
CharUpperA
TrackPopupMenu
CreatePopupMenu
FillRect
MessageBoxA
KillTimer
SetTimer
GetWindowLongA
GetParent
IsWindow
SetParent
IsWindowVisible
ReleaseDC
GetDC
InflateRect
PostMessageA
GetSystemMetrics
LoadIconA
SetForegroundWindow
InvalidateRect
GetWindowRect
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
GetWindow
SetWindowLongA
EnableWindow
SendMessageA
GetClientRect
SetWindowLongPtrA
gdi32
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetWindowExtEx
GetViewportExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
Ellipse
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
CreateRectRgnIndirect
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateSolidBrush
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
shell32
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathAddBackslashA
PathIsUNCA
oledlg
ord8
ole32
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocString
OleCreateFontIndirect
SafeArrayDestroy
VariantCopy
SysAllocStringByteLen
SysFreeString
SysStringLen
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SystemTimeToVariantTime
VariantTimeToSystemTime
dhnetsdk
ord60
ord99
ord95
ord414
ord132
ord460
ord461
ord403
ord313
ord295
ord297
ord54
ord93
ord408
ord409
ord162
ord120
ord100
ord404
ord405
ord101
ord7
ord85
ord9
ord1142
ord1
ord421
ord50
ord49
ord121
ord215
ord53
ord90
ord216
ord102
ord161
ord83
ord12
ord89
ord167
ord2
ord6
ord41
ord103
ord88
ord892
ord133
ord127
dhconfigsdk
ord1
ord2
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 461KB - Virtual size: 461KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
sharesec Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ