Static task
static1
Behavioral task
behavioral1
Sample
b13216b9168a8b6860f5d3b583b21437160f2c39d44691e37d4d580a5ffbe877.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b13216b9168a8b6860f5d3b583b21437160f2c39d44691e37d4d580a5ffbe877.exe
Resource
win10v2004-20240412-en
General
-
Target
b13216b9168a8b6860f5d3b583b21437160f2c39d44691e37d4d580a5ffbe877
-
Size
430KB
-
MD5
f52b0a2f576b3dbfe67b6732bf68ffe9
-
SHA1
19641d32f740ca345d1f9c5481d251e6bc550fdd
-
SHA256
b13216b9168a8b6860f5d3b583b21437160f2c39d44691e37d4d580a5ffbe877
-
SHA512
0e2a1711604e4379f795dd2a5f3694ff3b62c81d0687c560ab47f4995f3a615394ada620ee2dfc75f37083c9e87520fb2f18ad7d53d876d85db3ecb67f4ba894
-
SSDEEP
12288:mi+jhZ66A0KtlrHGb5wLb2rp8208P0L3IMmNyx:4hZ3A0K3jSGmN8dlmEx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b13216b9168a8b6860f5d3b583b21437160f2c39d44691e37d4d580a5ffbe877
Files
-
b13216b9168a8b6860f5d3b583b21437160f2c39d44691e37d4d580a5ffbe877.exe windows:5 windows x86 arch:x86
f879f589b367540220c2a09052d7b66b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
GetModuleFileNameA
FindNextFileW
GetDiskFreeSpaceExW
CloseHandle
DeleteFileA
GetVolumeInformationW
CreateThread
SetEndOfFile
GetLocaleInfoW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetEnvironmentVariableW
SetEnvironmentVariableA
CompareStringW
SetStdHandle
GetModuleHandleA
DebugBreak
CreateEventW
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
FreeLibrary
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileType
SetHandleCount
SetFilePointer
GlobalMemoryStatusEx
LockResource
FindClose
EnterCriticalSection
CopyFileA
GetComputerNameExW
GetLastError
MultiByteToWideChar
GetModuleFileNameW
TerminateProcess
LeaveCriticalSection
GetVersionExW
GetSystemPowerStatus
SizeofResource
Sleep
TerminateThread
WideCharToMultiByte
OpenProcess
GetDriveTypeA
GetSystemTimes
GetModuleHandleW
GetLogicalDrives
SetEvent
WaitForSingleObject
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
LoadResource
FindResourceW
FindResourceExW
FindFirstFileW
CreateFileA
IsValidLocale
GetCommandLineW
GetTimeZoneInformation
GetStdHandle
WriteFile
VirtualFree
HeapCreate
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetStringTypeW
GetFileAttributesA
LCMapStringA
LCMapStringW
RtlUnwind
GetCPInfo
GetStartupInfoA
GetCommandLineA
ExitProcess
GetSystemTimeAsFileTime
GetDateFormatA
GetTimeFormatA
CreateDirectoryA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualQuery
GetSystemInfo
GetProcAddress
VirtualAlloc
VirtualProtect
MoveFileA
lstrlenA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
RaiseException
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
InterlockedCompareExchange
user32
mouse_event
SetWindowsHookExW
CreateWindowExW
OpenClipboard
DefWindowProcW
GetWindowThreadProcessId
DispatchMessageW
LoadCursorW
DrawIconEx
GetKeyState
SendInput
GetMessageW
CloseClipboard
BlockInput
GetCursorInfo
GetClipboardData
SetCursorPos
MessageBoxA
GetKeyboardLayout
GetWindowTextA
CallNextHookEx
GetClientRect
GetDC
TranslateMessage
GetForegroundWindow
RegisterClassExW
LoadIconW
GetGUIThreadInfo
gdi32
DeleteDC
CreateDIBSection
GetDeviceCaps
StretchBlt
CreateDCW
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
SaveDC
GetObjectW
SetStretchBltMode
RestoreDC
BitBlt
advapi32
RegCloseKey
RegEnumKeyExW
CheckTokenMembership
RegisterServiceCtrlHandlerW
RegOpenKeyExW
FreeSid
SetServiceStatus
AllocateAndInitializeSid
RegDeleteValueW
RegQueryValueExW
RegCreateKeyExW
OpenServiceW
GetUserNameW
StartServiceCtrlDispatcherW
OpenSCManagerW
DeleteService
CreateServiceW
RegSetValueExW
shell32
SHGetPathFromIDListW
CommandLineToArgvW
ShellExecuteExA
ord644
ord645
ShellExecuteW
ShellExecuteA
ole32
CoInitializeEx
CoInitialize
CoInitializeSecurity
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
oleaut32
SysAllocString
SysStringLen
VariantClear
VariantCopy
SysAllocStringByteLen
VariantInit
VariantChangeType
SysFreeString
shlwapi
PathFindExtensionW
gdiplus
GdipCreateBitmapFromScan0
GdiplusStartup
GdipCloneImage
GdipSaveImageToFile
GdipGetImageEncoders
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdiplusShutdown
GdipSaveImageToStream
GdipFree
GdipAlloc
GdipGetImageEncodersSize
ws2_32
WSAGetLastError
inet_addr
recvfrom
WSAStartup
connect
gethostname
htons
send
gethostbyname
closesocket
socket
bind
recv
WSACleanup
sendto
setsockopt
psapi
GetModuleFileNameExA
EnumProcesses
GetModuleFileNameExW
Sections
.text Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ