Static task
static1
Behavioral task
behavioral1
Sample
2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe
Resource
win10v2004-20240226-en
General
-
Target
2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf
-
Size
208KB
-
MD5
0f6e7efe4630bf314fd5d895f55bcd08
-
SHA1
764aa932c863988647b19e13917b288536bc144b
-
SHA256
2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf
-
SHA512
1360102c8b590029080cbefa6193c104557904398879ba6f60cf18e1696cd4e5d9325ca0aa204e7b89b4b23e4bd3d13a08a31d8e64f7d8fc7b1abf55bac1e2cf
-
SSDEEP
3072:MfK8TVSj1FQ021LSaDoKi6NgdgG6cCnebXQmL7A25A41:A5SZFQ71LSooKi6NwgG6cTLADy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf
Files
-
2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe windows:5 windows x86 arch:x86
083ba48d60fa2e92ab89db45eecf363c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
InternetConnectA
InternetOpenA
kernel32
FreeLibrary
InterlockedExchange
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
SetStdHandle
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
LCMapStringA
LCMapStringW
SetEndOfFile
GetProcessHeap
ReadFile
CompareStringA
lstrlenA
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
LocalAlloc
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
LocalReAlloc
GetModuleHandleA
GlobalAddAtomA
lstrcmpA
GlobalFlags
GlobalGetAtomNameA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
RtlUnwind
HeapSize
GetCurrentThreadId
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
InterlockedIncrement
RaiseException
WriteFile
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetStartupInfoA
GetCommandLineA
ExitProcess
GetModuleHandleW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
LeaveCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsA
GetProcAddress
LoadLibraryA
GetModuleFileNameA
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateFileA
CreateEventA
SetLastError
DeleteFileA
WinExec
Sleep
GetComputerNameA
GetWindowsDirectoryA
GetVersionExA
InterlockedDecrement
FindResourceA
SizeofResource
LockResource
LoadResource
GetLastError
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
WriteConsoleW
user32
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
PostMessageA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
SetWindowsHookExA
CallNextHookEx
GetKeyState
PeekMessageA
ValidateRect
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
DestroyMenu
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GrayStringA
DrawTextExA
DrawTextA
GetClassInfoA
TabbedTextOutA
CreateWindowExA
DispatchMessageA
GetMessageA
SetTimer
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
shell32
SHGetSpecialFolderLocation
ShellExecuteA
SHGetSpecialFolderPathA
SHGetPathFromIDListA
ole32
CoInitialize
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitializeSecurity
CoInitializeEx
oleaut32
VariantChangeType
VariantClear
SysAllocString
SysFreeString
VariantInit
urlmon
URLDownloadToFileA
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
GetStockObject
SetViewportOrgEx
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
ExtTextOutA
DeleteDC
RestoreDC
SetMapMode
SelectObject
Escape
TextOutA
RectVisible
SaveDC
ScaleWindowExtEx
SetWindowExtEx
DeleteObject
ScaleViewportExtEx
SetViewportExtEx
GetDeviceCaps
PtVisible
OffsetViewportOrgEx
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ