Static task
static1
Behavioral task
behavioral1
Sample
085c365b58913655d32ca150f9bc0ca3ef0b5368000f6f3e3d235d5a5c0e00e5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
085c365b58913655d32ca150f9bc0ca3ef0b5368000f6f3e3d235d5a5c0e00e5.exe
Resource
win10v2004-20231215-en
General
-
Target
085c365b58913655d32ca150f9bc0ca3ef0b5368000f6f3e3d235d5a5c0e00e5
-
Size
744KB
-
MD5
c7e173e448d85df43cdfebbe6f6c4816
-
SHA1
e483eb936ac2ec1417f244106a3769fe964a2967
-
SHA256
085c365b58913655d32ca150f9bc0ca3ef0b5368000f6f3e3d235d5a5c0e00e5
-
SHA512
b3e317cfa263539e4f8387a6a72f6daedd977d433cdc7a929b9c32024f547fb58024e187a4cf47dc89d1bf205ee0b665a4fc563621d18faf8b376c9febefdcf5
-
SSDEEP
12288:Vq+3BwW//AC4IepeWCk2DCiuZuUA3EYkXu90Xgg02KO4rFfZ:90ck2WiuZuB3Ei9agOKTf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 085c365b58913655d32ca150f9bc0ca3ef0b5368000f6f3e3d235d5a5c0e00e5
Files
-
085c365b58913655d32ca150f9bc0ca3ef0b5368000f6f3e3d235d5a5c0e00e5.exe windows:4 windows x86 arch:x86
870d4dddf27730b38eb0ee142d0e7912
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
LocalFileTimeToFileTime
SetErrorMode
GetStartupInfoW
RtlUnwind
HeapReAlloc
ExitProcess
GetSystemTimeAsFileTime
ExitThread
RaiseException
SetStdHandle
GetFileType
HeapSize
SetUnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GlobalFlags
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
QueryPerformanceCounter
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentDirectoryA
GetDriveTypeA
SetEndOfFile
UnlockFile
LockFile
GetThreadLocale
FileTimeToSystemTime
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
GetFullPathNameW
GetTempFileNameW
GetFileTime
GetFileAttributesW
InterlockedDecrement
ResumeThread
GetModuleHandleA
FormatMessageW
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
GetVersionExA
WritePrivateProfileStringW
GetPrivateProfileIntW
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
SetCurrentDirectoryW
MoveFileW
GetDateFormatW
GetTimeFormatW
GetComputerNameW
ExpandEnvironmentStringsW
GetSystemDirectoryW
SetThreadExecutionState
GetCurrentThreadId
GetCurrentDirectoryW
CreateRemoteThread
CreateThread
CreatePipe
SetHandleInformation
GetStdHandle
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetExitCodeProcess
TerminateProcess
GetProcessHeap
HeapAlloc
HeapFree
DosDateTimeToFileTime
WaitForSingleObject
TerminateThread
DuplicateHandle
OpenProcess
GetCurrentProcessId
VirtualFree
VirtualAlloc
QueryDosDeviceW
GetTimeZoneInformation
GetSystemTime
RemoveDirectoryW
SetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
MoveFileExW
SystemTimeToFileTime
SetFileTime
GetTickCount
GetModuleHandleW
CreateDirectoryW
SetLastError
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetLocalTime
GetModuleFileNameW
GetWindowsDirectoryW
GetLogicalDrives
lstrlenA
WideCharToMultiByte
lstrcatW
lstrcmpW
Sleep
FlushFileBuffers
LocalAlloc
LocalFree
lstrcpynW
GetFileSize
GetVolumeInformationW
lstrcpyW
GetDiskFreeSpaceW
GetDriveTypeW
WriteFile
SetFilePointer
LoadLibraryW
GetProcAddress
FreeLibrary
ReadFile
GetCurrentProcess
SetPriorityClass
GetLastError
CreateFileW
DeviceIoControl
CloseHandle
lstrlenW
lstrcmpiW
MulDiv
GetVersionExW
LoadResource
LockResource
SizeofResource
FindResourceW
GetCommandLineA
MultiByteToWideChar
user32
UnregisterClassW
GetSysColorBrush
CharUpperW
DestroyMenu
PostQuitMessage
GetMessageW
GetCursorPos
ValidateRect
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ShowWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
CheckRadioButton
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
RemovePropW
GetFocus
SetFocus
GetWindowTextLengthW
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
KillTimer
SetTimer
SetForegroundWindow
GetWindow
PostMessageW
GetPropW
GetWindowThreadProcessId
GetWindowTextW
EnumWindows
IsWindowVisible
ExitWindowsEx
TranslateMessage
DispatchMessageW
GetWindowRect
GetKeyState
GetActiveWindow
InvalidateRect
PtInRect
LoadCursorW
CopyIcon
SetCursor
MessageBeep
LoadIconW
GetClientRect
IsIconic
GetSystemMenu
AppendMenuW
DrawIcon
GetSystemMetrics
UpdateWindow
SendMessageW
GetTabbedTextExtentW
SetRect
GetDC
ReleaseDC
wsprintfW
PeekMessageW
RedrawWindow
GetSysColor
EnableWindow
UnregisterClassA
gdi32
DeleteDC
SetStretchBltMode
SetBkMode
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
IntersectClipRect
SetMapMode
CreateSolidBrush
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
StretchBlt
CreateCompatibleBitmap
CreatePalette
SelectPalette
RealizePalette
CreateDIBitmap
SelectObject
BitBlt
EndDoc
AbortDoc
SetAbortProc
EndPage
StartPage
StartDocW
GetCharWidthW
GetTextExtentPoint32W
DPtoLP
CreateCompatibleDC
ScaleWindowExtEx
DeleteObject
GetTextMetricsW
GetStockObject
GetObjectW
GetDeviceCaps
CreateFontIndirectW
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
SetSecurityDescriptorOwner
RegQueryValueW
GetFileSecurityW
GetUserNameW
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
CopySid
LookupAccountNameW
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
RegCloseKey
SetFileSecurityW
RegEnumValueW
RegEnumKeyW
RegCreateKeyW
RegOpenKeyW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegEnumKeyExW
RegDeleteKeyW
RegDeleteValueW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
shell32
ShellExecuteExW
SHGetSpecialFolderPathW
ShellExecuteW
comctl32
_TrackMouseEvent
shlwapi
PathFindExtensionW
PathStripToRootW
PathFindFileNameW
PathIsUNCW
ole32
CoCreateInstance
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
ws2_32
WSACleanup
socket
WSAStartup
bind
htonl
htons
connect
gethostbyname
inet_addr
send
recv
closesocket
listen
accept
select
gethostname
getsockname
inet_ntoa
WSASetLastError
winhttp
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpConnect
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
iphlpapi
GetAdaptersAddresses
rpcrt4
UuidCreateSequential
powrprof
CallNtPowerInformation
Sections
.text Size: 520KB - Virtual size: 516KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ