Static task
static1
Behavioral task
behavioral1
Sample
57dcb5d2011c05bb7d474eaabaecf8ddad151e77390b079b0ad90c9aa3c2ce53.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
57dcb5d2011c05bb7d474eaabaecf8ddad151e77390b079b0ad90c9aa3c2ce53.exe
Resource
win10v2004-20240226-en
General
-
Target
57dcb5d2011c05bb7d474eaabaecf8ddad151e77390b079b0ad90c9aa3c2ce53
-
Size
6.3MB
-
MD5
2e6aa72f32fff43ab1900277943fcb60
-
SHA1
2c6a35b83ed8af0c0edc43e30cfc35e54a389609
-
SHA256
57dcb5d2011c05bb7d474eaabaecf8ddad151e77390b079b0ad90c9aa3c2ce53
-
SHA512
ed3364284a5118628eac0cec907bdc99c3193da6081ede6ad58437c4ab02131bc313124c18d133df756d65880f06fe4002717f14ed7e5201b3d6c0c31b7c5b0a
-
SSDEEP
98304:wCb8CcUqASzsKZQK3MT08tEQTT4D7mKLWq9:hnys23kttT49P9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 57dcb5d2011c05bb7d474eaabaecf8ddad151e77390b079b0ad90c9aa3c2ce53
Files
-
57dcb5d2011c05bb7d474eaabaecf8ddad151e77390b079b0ad90c9aa3c2ce53.exe windows:6 windows x86 arch:x86
0420bff906ec740184bb1c8e425ca4d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
SwitchToThread
GetFullPathNameA
CreateFileA
MapViewOfFile
UnmapViewOfFile
GetFileAttributesExA
WriteFile
GetFileAttributesA
GetFileSizeEx
GetLastError
CreateFileMappingA
GetCurrentDirectoryA
GetTempPathA
DeleteFileA
GetModuleHandleA
GetCurrentThread
GetVolumeInformationA
SetThreadPriority
GetProcAddress
LoadLibraryA
GlobalMemoryStatus
GetCurrentProcess
IsProcessorFeaturePresent
IsWow64Process
GetSystemInfo
IsDebuggerPresent
GetVersionExA
GetCurrentProcessId
SetPriorityClass
MulDiv
K32GetProcessMemoryInfo
GetSystemTimes
GetProcessTimes
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalSize
CreateProcessA
GetCurrentThreadId
CreateThread
GetCommandLineA
AreFileApisANSI
MultiByteToWideChar
HeapFree
ReadFile
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
FindClose
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
WideCharToMultiByte
HeapAlloc
GetStdHandle
GetFileType
LeaveCriticalSection
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
DeleteCriticalSection
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
GetProcessHeap
GetModuleFileNameW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MoveFileExW
GetConsoleCP
GetConsoleMode
DeleteFileW
HeapReAlloc
HeapSize
HeapQueryInformation
SetFilePointerEx
ReadConsoleW
FindFirstFileExW
FindNextFileW
CreateDirectoryW
GetTimeZoneInformation
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
SetStdHandle
FlushFileBuffers
OutputDebugStringW
GetStringTypeW
WriteConsoleW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
CreateFileW
SetEndOfFile
SetEnvironmentVariableA
GetVersion
FlushConsoleInputBuffer
InitializeCriticalSection
SleepEx
FormatMessageA
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
GetTempFileNameW
GetTempPathW
CreateEventA
Sleep
InitializeCriticalSectionAndSpinCount
SetEvent
WaitForSingleObject
TryEnterCriticalSection
EnterCriticalSection
ReadConsoleInputA
SetConsoleMode
ExitThread
FileTimeToLocalFileTime
GetFileInformationByHandle
RaiseException
GetDriveTypeW
GetFullPathNameW
GetCurrentDirectoryW
GetModuleFileNameA
GetStartupInfoW
SetCurrentDirectoryA
user32
SetLayeredWindowAttributes
SetWindowLongA
SetFocus
SetClipboardData
GetClipboardSequenceNumber
OpenClipboard
EmptyClipboard
GetClipboardData
IsClipboardFormatAvailable
CloseClipboard
DestroyCursor
CreateIconFromResourceEx
SetCursor
EqualRect
ReleaseCapture
GetCapture
SetCapture
GetUserObjectInformationW
GetProcessWindowStation
GetDesktopWindow
EnableWindow
LoadCursorA
GetFocus
GetAsyncKeyState
GetWindowLongA
GetSystemMetrics
MapWindowPoints
EnumDisplayMonitors
GetWindowRect
GetMonitorInfoA
SetCursorPos
MonitorFromWindow
SetWindowPos
GetCursorPos
SystemParametersInfoA
DestroyWindow
GetSystemMenu
RegisterClassExA
IsIconic
IsZoomed
LoadIconA
GetClientRect
CreateWindowExA
ShowWindow
InsertMenuA
AdjustWindowRect
FindWindowA
GetDoubleClickTime
MapVirtualKeyA
GetMessageA
SendMessageA
GetDC
BringWindowToTop
UnregisterClassA
ReleaseDC
DefWindowProcA
UpdateWindow
PostMessageA
ScreenToClient
DispatchMessageA
PeekMessageA
MessageBoxA
GetWindowTextA
TranslateMessage
EnumWindows
SetForegroundWindow
GetClassNameA
SetWindowTextA
d3d9
Direct3DCreate9
winmm
timeEndPeriod
timeBeginPeriod
timeGetTime
shlwapi
PathIsRelativeA
iphlpapi
GetAdaptersInfo
gdi32
CreateFontA
DeleteObject
GetDeviceCaps
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
ReportEventA
DeregisterEventSource
OpenSCManagerA
EnumServicesStatusA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyExA
RegisterEventSourceA
RegQueryValueExA
RegSetValueExA
shell32
DragQueryPoint
DragFinish
DragQueryFileA
ShellExecuteExA
ShellExecuteA
DragAcceptFiles
SHGetFolderPathA
ole32
CoUninitialize
ws2_32
ntohl
htonl
gethostname
ioctlsocket
select
__WSAFDIsSet
listen
accept
recvfrom
sendto
getaddrinfo
freeaddrinfo
WSASetLastError
connect
socket
closesocket
getpeername
getsockopt
htons
bind
shutdown
WSACleanup
getsockname
setsockopt
send
recv
WSAGetLastError
WSAStartup
ntohs
wldap32
ord22
ord211
ord143
ord60
ord50
ord26
ord30
ord32
ord35
ord79
ord200
ord33
ord301
ord27
ord41
ord46
Sections
.text Size: 3.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.2MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ