Static task
static1
Behavioral task
behavioral1
Sample
b126a83eeab06947c6babf0be8e469274585218ffc2dab5a6d650e5dbc4e58be.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b126a83eeab06947c6babf0be8e469274585218ffc2dab5a6d650e5dbc4e58be.exe
Resource
win10v2004-20240221-en
General
-
Target
b126a83eeab06947c6babf0be8e469274585218ffc2dab5a6d650e5dbc4e58be
-
Size
682KB
-
MD5
780f46e18996e23a6bdc80b21618938d
-
SHA1
2278065b8324efa4a8d92f6b015bc58d5319f26c
-
SHA256
b126a83eeab06947c6babf0be8e469274585218ffc2dab5a6d650e5dbc4e58be
-
SHA512
a6c6ba2ccfc9dc6d813423ad04945fe664140d8c28906e1f4f59f8b300ff553a0747e0d7ab22ef4bb727b038f8282fe013a494fb9799f7a2c59445fd19124d4b
-
SSDEEP
6144:xUj6CouoA4JMCeDcM8Lk2VBZfyNhb4yhBzxsGEsPYIXxg9OU7vP2I1oMjaeINBaL:xI6CouoASSELyWGE0YmxgJnweLx0G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b126a83eeab06947c6babf0be8e469274585218ffc2dab5a6d650e5dbc4e58be
Files
-
b126a83eeab06947c6babf0be8e469274585218ffc2dab5a6d650e5dbc4e58be.exe windows:4 windows x64 arch:x64
6e1570d36b4ff050ce6eb3eb99886a40
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
comctl32
ord17
comdlg32
CommDlgExtendedError
GetSaveFileNameW
GetOpenFileNameW
gdi32
DeleteObject
CreateFontIndirectW
oleaut32
SysAllocString
SysStringByteLen
VariantClear
SysAllocStringLen
SysStringLen
VariantCopy
ole32
CoTaskMemFree
CoCreateInstance
OleInitialize
CoUninitialize
CoInitialize
user32
LoadStringW
SendMessageW
GetWindowTextLengthW
GetWindowTextW
GetParent
GetWindowRect
EmptyClipboard
MoveWindow
ShowWindow
SetWindowLongPtrW
GetWindowLongPtrW
GetDlgItem
MapDialogRect
SystemParametersInfoW
GetMonitorInfoA
MonitorFromWindow
DialogBoxParamW
SetClipboardData
CloseClipboard
OpenClipboard
CharUpperW
ScreenToClient
IsWindowEnabled
SetDlgItemTextA
GetFocus
EnableWindow
SetFocus
LoadIconW
LoadCursorW
SetCursor
SetDlgItemTextW
KillTimer
SetTimer
MessageBoxW
CheckDlgButton
PostMessageW
GetKeyState
EndDialog
SetWindowTextW
InvalidateRect
IsDlgButtonChecked
advapi32
LookupPrivilegeValueW
RegOpenKeyExA
RegQueryValueExA
GetFileSecurityW
SetFileSecurityW
RegEnumKeyExW
RegOpenKeyExW
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
shell32
SHBrowseForFolderW
SHGetFileInfoW
SHGetPathFromIDListW
msvcrt
strcmp
wcscmp
wcsstr
malloc
free
memset
strlen
memcmp
_isatty
_iob
memmove
_beginthreadex
__C_specific_handler
??1type_info@@UEAA@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_XcptFilter
_c_exit
_cexit
exit
_acmdln
__CxxFrameHandler
_CxxThrowException
memcpy
_purecall
__getmainargs
_initterm
__setusermatherr
_commode
_fmode
__set_app_type
_exit
kernel32
WaitForSingleObject
GetVersion
GetLargePageMinimum
VirtualFree
VirtualAlloc
GetCommandLineW
lstrcatW
WaitForMultipleObjects
SetPriorityClass
Sleep
GetSystemDefaultLangID
GetUserDefaultLangID
GetProcessTimes
QueryPerformanceFrequency
QueryPerformanceCounter
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetProcessAffinityMask
OpenEventW
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
SetEvent
GetSystemTimeAsFileTime
FileTimeToDosDateTime
IsProcessorFeaturePresent
GlobalMemoryStatusEx
ResumeThread
GetProcessAffinityMask
lstrlenW
FileTimeToLocalFileTime
FileTimeToSystemTime
CompareFileTime
GetModuleHandleW
GetProcAddress
GetCurrentProcess
GlobalFree
GlobalAlloc
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetDriveTypeW
SetEndOfFile
WriteFile
ReadFile
SetFilePointer
GetFileSize
InitializeCriticalSection
LoadLibraryA
GetStartupInfoA
TerminateProcess
SetThreadAffinityMask
GetSystemInfo
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
GetStdHandle
DeviceIoControl
GetLogicalDriveStringsW
GetFileAttributesW
FindNextStreamW
FindFirstStreamW
FindNextFileW
FindFirstFileW
FindClose
GetFileInformationByHandle
GetCurrentThreadId
GetTickCount
GetCurrentProcessId
SetLastError
GetTempPathW
GetCurrentDirectoryW
SetCurrentDirectoryW
DeleteFileW
CreateDirectoryW
CreateHardLinkW
MoveFileW
RemoveDirectoryW
SetFileAttributesW
CreateFileW
SetFileTime
CloseHandle
FormatMessageW
LocalFree
RtlCaptureContext
GetModuleFileNameW
LoadLibraryW
LoadLibraryExW
FreeLibrary
GlobalUnlock
GlobalLock
WideCharToMultiByte
MultiByteToWideChar
GetLastError
Sections
.text Size: 455KB - Virtual size: 455KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ