Static task
static1
Behavioral task
behavioral1
Sample
68f953f962964532f421c386014153b43796ec53aa3a876e31fff565271431db.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68f953f962964532f421c386014153b43796ec53aa3a876e31fff565271431db.exe
Resource
win10v2004-20240412-en
General
-
Target
68f953f962964532f421c386014153b43796ec53aa3a876e31fff565271431db
-
Size
1.1MB
-
MD5
29e583ce23b9dd282681fb073c7ed912
-
SHA1
1b5d3af3002325b9b9696c18f8b05447aa05712f
-
SHA256
68f953f962964532f421c386014153b43796ec53aa3a876e31fff565271431db
-
SHA512
d22e9432373fc9c359c4e45522c7f5d6d49d0032a7f49d548ea82c1517b7663fb4c5c3e4b882e18c1fbc9c6f87569ec5c06d8dcf62e187d7865793dd37c64558
-
SSDEEP
12288:/KdeYqxG3V1jMn4D752IGc73iDZdIn5nXWPx4Rf6Ivy7Kpgvju2Dk6OFB/rC:/R4k4D75263i6Sx4RfPvy7Egq2DSB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68f953f962964532f421c386014153b43796ec53aa3a876e31fff565271431db
Files
-
68f953f962964532f421c386014153b43796ec53aa3a876e31fff565271431db.exe windows:4 windows x86 arch:x86
4e15313a9a5e7c4169e5f6c014e125a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetUnhandledExceptionFilter
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileType
GetProfileStringA
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
LCMapStringW
LCMapStringA
HeapReAlloc
HeapSize
TerminateProcess
GetACP
GetLocalTime
GetSystemTime
GetTimeZoneInformation
RaiseException
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RtlUnwind
SetErrorMode
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
GetCurrentDirectoryA
SizeofResource
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetShortPathNameA
GetStringTypeExA
GetVolumeInformationA
FindFirstFileA
FindClose
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetFullPathNameA
GetTempFileNameA
GetFileAttributesA
GlobalAlloc
GetCurrentThread
lstrcmpA
FormatMessageA
LocalFree
FileTimeToLocalFileTime
FileTimeToSystemTime
MulDiv
SetLastError
lstrcpynA
GlobalLock
GlobalUnlock
GlobalFree
FreeLibrary
FindResourceA
LoadResource
LockResource
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetVersionExA
CreateFileA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
WritePrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileStringA
WriteFile
GetTickCount
ReadFile
CloseHandle
GetWindowsDirectoryA
lstrcpyA
GetPrivateProfileIntA
user32
SetMenu
DestroyMenu
GetDesktopWindow
SetCursor
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
GetDC
ReleaseDC
EndDialog
GetActiveWindow
CreateDialogIndirectParamA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
PostMessageA
SendDlgItemMessageA
MapWindowPoints
PeekMessageA
DispatchMessageA
GetFocus
SetActiveWindow
IsWindow
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
IsWindowVisible
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
GetScrollPos
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
ReuseDDElParam
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
DrawTextA
TrackPopupMenu
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
GetDCEx
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
EnableWindow
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
SendMessageA
GrayStringA
PostThreadMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
LoadCursorA
LoadMenuA
GetSubMenu
ClientToScreen
LoadIconA
GetCursorPos
ScreenToClient
KillTimer
UnpackDDElParam
BringWindowToTop
GetWindowDC
BeginPaint
wsprintfA
EndPaint
GetParent
GetClientRect
SetScrollRange
SetScrollPos
UpdateWindow
SetTimer
LoadBitmapA
GetSysColor
CopyRect
FillRect
DrawFocusRect
InvalidateRect
RegisterClipboardFormatA
LockWindowUpdate
WindowFromPoint
GetTabbedTextExtentA
MessageBeep
GetNextDlgGroupItem
CopyAcceleratorTableA
DestroyIcon
GetMenuStringA
InsertMenuA
FindWindowA
GetSysColorBrush
GetClassNameA
LoadStringA
CharUpperA
GetSystemMenu
DeleteMenu
AppendMenuA
IsRectEmpty
SetParent
CharNextA
IsZoomed
SetRect
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
ShowOwnedPopups
PostQuitMessage
DestroyCursor
SetCursorPos
PtInRect
CallWindowProcA
InvertRect
SetCapture
RedrawWindow
GetMenuItemID
InflateRect
TabbedTextOutA
gdi32
SetPolyFillMode
SetROP2
SetStretchBltMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
IntersectClipRect
MoveToEx
LineTo
SetTextAlign
GetCurrentPositionEx
DeleteObject
CreateRectRgn
SetBkMode
GetWindowExtEx
ExtCreatePen
CreatePatternBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
DPtoLP
GetViewportOrgEx
AbortDoc
EndDoc
EndPage
StartPage
SetAbortProc
CreateDCA
StretchDIBits
GetCharWidthA
GetMapMode
SetRectRgn
CombineRgn
CreateFontIndirectA
GetTextExtentPoint32A
GetTextColor
GetBkColor
LPtoDP
GetNearestColor
GetStretchBltMode
GetPolyFillMode
GetTextAlign
GetBkMode
GetROP2
GetTextFaceA
GetWindowOrgEx
GetStockObject
RestoreDC
SaveDC
StartDocA
DeleteDC
CreateRectRgnIndirect
PatBlt
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
SetPixelV
GetTextMetricsA
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
GetDeviceCaps
CreatePen
StretchBlt
BitBlt
SelectObject
CreateSolidBrush
CreateFontA
GetViewportExtEx
CreateDIBitmap
GetTextExtentPointA
Rectangle
comdlg32
GetOpenFileNameA
PrintDlgA
GetFileTitleA
CommDlgExtendedError
GetSaveFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyA
RegOpenKeyExA
RegCloseKey
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
SetFileSecurityA
RegSetValueA
RegQueryValueExA
GetFileSecurityA
shell32
SHGetFileInfoA
DragQueryFileA
DragFinish
ExtractIconA
comctl32
ImageList_ReplaceIcon
ImageList_SetBkColor
ord17
ImageList_Destroy
ImageList_Create
oledlg
ord8
ole32
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
olepro32
ord253
oleaut32
SafeArrayUnaccessData
SysFreeString
VariantClear
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayCreate
SafeArrayRedim
VariantCopy
SysAllocString
SysAllocStringByteLen
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SysAllocStringLen
Sections
.text Size: 340KB - Virtual size: 337KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 700KB - Virtual size: 697KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ