Static task
static1
Behavioral task
behavioral1
Sample
a1c2a7e331833939558699870447297714787802ed08ddf1f29c9696624cc4d4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1c2a7e331833939558699870447297714787802ed08ddf1f29c9696624cc4d4.exe
Resource
win10-20240404-en
General
-
Target
a1c2a7e331833939558699870447297714787802ed08ddf1f29c9696624cc4d4
-
Size
3.0MB
-
MD5
b8ddddd1fe5263c97954e9f953138773
-
SHA1
d23497ae902b94bef96e67badec908aac2d59abb
-
SHA256
a1c2a7e331833939558699870447297714787802ed08ddf1f29c9696624cc4d4
-
SHA512
cdddaf9cefcf9d3a1df90d7f9ad8b521a899add8df70dc0d7e7cb7892214c8c84f0f481e986cf59b128031d726f36e71948ae2488692784aaaf803ef73db3238
-
SSDEEP
49152:R9sCb7MNdPwfcpIcWfcT2kKfrv9cCcJf/3waEOHJiFkhyBJcHbvUurcAsN:KJtyBMTRs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1c2a7e331833939558699870447297714787802ed08ddf1f29c9696624cc4d4
Files
-
a1c2a7e331833939558699870447297714787802ed08ddf1f29c9696624cc4d4.exe windows:6 windows x64 arch:x64
8ec0d18d6b1d623de0ddf920b508d656
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
ReleaseMutex
SleepEx
CreateEventW
CancelWaitableTimer
GetProcessTimes
GetExitCodeProcess
SetThreadPriority
GetThreadPriorityBoost
GetThreadPriority
GetProcessVersion
SetPriorityClass
GetPriorityClass
GetProcessId
GetThreadContext
FlushInstructionCache
GetThreadTimes
OpenProcess
GetProcessHandleCount
GetProcessPriorityBoost
SetProcessPriorityBoost
GetThreadIOPendingFlag
SetSystemTimeAdjustment
CreateFileMappingW
FlushViewOfFile
SetProcessWorkingSetSize
GetWriteWatch
ResetWriteWatch
CreateMemoryResourceNotification
QueueUserWorkItem
IsProcessInJob
AssignProcessToJobObject
SetInformationJobObject
IsWow64Process
DisableThreadLibraryCalls
FreeResource
GetModuleFileNameA
GetModuleFileNameW
LockResource
GlobalUnlock
GlobalCompact
GlobalUnfix
GlobalUnWire
LocalUnlock
LocalShrink
LocalCompact
GetBinaryTypeW
GetProcessAffinityMask
GetProcessIoCounters
SwitchToFiber
ConvertFiberToThread
CreateFiberEx
CreateFiber
ConvertThreadToFiber
PulseEvent
GlobalDeleteAtom
InitAtomTable
DeleteAtom
SetHandleCount
SetMessageWaitingIndicator
SetFileShortNameW
ClearCommBreak
ClearCommError
EscapeCommFunction
GetCommMask
GetCommModemStatus
GetCommTimeouts
TransmitCommChar
GetTapePosition
PrepareTape
EraseTape
CreateTapePartition
GetTapeStatus
SetTapeParameters
MulDiv
GetMailslotInfo
SetMailslotInfo
lstrcpyW
AddAtomW
GetNamedPipeHandleStateA
ReadDirectoryChangesW
MapUserPhysicalPagesScatter
FindVolumeMountPointClose
GetNumaProcessorNode
LCMapStringW
GetCalendarInfoW
GetNumberFormatW
CreateIoCompletionPort
IsValidLanguageGroup
IsValidLocale
SetUserGeoID
SetThreadLocale
GetUserDefaultUILanguage
EnumUILanguagesW
GetConsoleOutputCP
ReadConsoleInputW
PeekConsoleInputW
ReadConsoleW
SetConsoleCtrlHandler
FillConsoleOutputCharacterW
ReadConsoleOutputCharacterW
WriteConsoleInputW
GetNumberOfConsoleMouseButtons
GetConsoleWindow
Sleep
ExitProcess
GlobalSize
LocalSize
GlobalFlags
GlobalHandle
LocalHandle
GetModuleHandleW
GetProcAddress
WriteConsoleW
CloseHandle
GetConsoleMode
HeapReAlloc
HeapSize
SetFilePointerEx
GetProcessHeap
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindClose
HeapFree
HeapAlloc
GetModuleHandleExW
WriteFile
RtlPcToFileHeader
RaiseException
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLastError
RtlUnwindEx
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetNamedPipeHandleStateW
GetNamedPipeInfo
PeekNamedPipe
DisconnectNamedPipe
SetLastError
SetHandleInformation
DecodeSystemPointer
EncodeSystemPointer
DecodePointer
EncodePointer
UnlockFileEx
UnlockFile
SetFileValidData
SetFilePointer
SetEndOfFile
LockFileEx
LockFile
GetTempFileNameW
GetLogicalDriveStringsW
GetLogicalDrives
GetFileTime
GetFileType
GetFileSizeEx
GetFileSize
GetFileInformationByHandle
GetFileAttributesExW
FlushFileBuffers
FindNextVolumeW
FindNextFileW
FindNextChangeNotification
PostQueuedCompletionStatus
FindFirstFileExW
CreateFileW
SearchPathW
GetCommandLineW
SetStdHandle
GetCurrencyFormatW
GetStdHandle
user32
WindowFromDC
GetDCEx
LockWindowUpdate
GetWindowTextW
GetCursor
InflateRect
GetClassWord
SetClassWord
GetClassLongW
GetWindowThreadProcessId
GetLastActivePopup
PrivateExtractIconsW
GetIconInfo
WinHelpW
GetGuiResources
GetWindowInfo
SetForegroundWindow
DrawTextW
GetMenuItemRect
TabbedTextOutW
GetMenuItemID
VkKeyScanW
ToAsciiEx
ToAscii
GetKeyboardType
GetKeyboardState
IsCharUpperW
IsCharAlphaW
CharUpperBuffW
CharUpperW
OemToCharBuffW
CharToOemBuffW
OemToCharW
GetOpenClipboardWindow
GetClipboardViewer
SetDlgItemTextW
IsZoomed
WaitForInputIdle
EnableWindow
GetCursorPos
GetMenuDefaultItem
GrayStringW
CharLowerBuffA
GetSystemMenu
GetMessageA
CheckMenuRadioItem
ChildWindowFromPoint
DefDlgProcA
InvalidateRect
InsertMenuItemA
FindWindowA
SetDlgItemInt
EnableMenuItem
GetSysColorBrush
PostQuitMessage
CheckDlgButton
KillTimer
UnregisterClassA
GetDlgItem
GetClientRect
CheckMenuItem
DispatchMessageA
GetWindowRect
RemoveMenu
AppendMenuA
CharUpperA
LoadIconA
CreateDialogParamA
SetCursor
SetClipboardData
SendMessageA
SetDlgItemTextA
GetClassInfoA
SendDlgItemMessageA
GetClipboardData
TranslateMessage
SetFocus
DestroyMenu
RegisterClassA
IsDlgButtonChecked
EnumClipboardFormats
MoveWindow
GetSysColor
MessageBoxA
SetWindowTextA
wvsprintfA
SetWindowPlacement
GetWindowLongA
GetWindowTextA
EmptyClipboard
DestroyAcceleratorTable
CallWindowProcA
CloseClipboard
ClientToScreen
SetWindowLongA
IsMenu
SetMenuItemInfoA
IsDialogMessageA
DestroyIcon
RedrawWindow
SetTimer
GetDlgItemTextA
TranslateAcceleratorA
OpenClipboard
IsWindow
GetActiveWindow
GetSubMenu
wsprintfA
TrackPopupMenu
DestroyCursor
GetWindowPlacement
DialogBoxParamA
CreatePopupMenu
GetSystemMetrics
EndDialog
PostMessageA
SetActiveWindow
CheckRadioButton
SetWindowPos
DestroyWindow
LoadCursorA
GetMenu
LoadAcceleratorsA
gdi32
GetObjectA
DeleteObject
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
GetStockObject
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegOpenKeyExA
GetUserNameW
OpenProcessToken
GetUserNameA
LookupPrivilegeValueA
RegQueryValueExA
RegDeleteKeyA
RegSetValueA
RegCloseKey
RegCreateKeyA
AdjustTokenPrivileges
oleaut32
OleIconToCursor
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerFindFileW
comctl32
PropertySheetW
ord13
ord15
ord14
ord410
ord411
ImageList_SetBkColor
ord413
InitCommonControlsEx
ImageList_Remove
CreateToolbarEx
ImageList_Destroy
ImageList_Create
ImageList_ReplaceIcon
dxgi
CreateDXGIFactory
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 231KB - Virtual size: 231KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 257KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ