Static task
static1
Behavioral task
behavioral1
Sample
e55a365dc985d335ef14213b95dc14f06236277391aed72ea004f0a93b478c7f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e55a365dc985d335ef14213b95dc14f06236277391aed72ea004f0a93b478c7f.exe
Resource
win10v2004-20240508-en
General
-
Target
e55a365dc985d335ef14213b95dc14f06236277391aed72ea004f0a93b478c7f
-
Size
4.8MB
-
MD5
bfdbcd538eeec754ab4f429c0d570a55
-
SHA1
b1c06c430a672d4f0304ca7467f08e40941fcbf2
-
SHA256
e55a365dc985d335ef14213b95dc14f06236277391aed72ea004f0a93b478c7f
-
SHA512
82a7d8b7995173b5161b0e4e1bb9315857416c7443f9f121193561c3d78ffb00d5dfcccdc231facb5011013accb73a0bcb528db8accbb6746c0537a245a02828
-
SSDEEP
98304:qUnJRa5++VsV0gBaqOWQ81ycLOiIdLmTVh8GaWaIgr2Tvm4LVKERP59Utob2ugZd:qgwBAm/fsFWaNcDR+C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e55a365dc985d335ef14213b95dc14f06236277391aed72ea004f0a93b478c7f
Files
-
e55a365dc985d335ef14213b95dc14f06236277391aed72ea004f0a93b478c7f.exe windows:6 windows x86 arch:x86
8f3c4dff8461e0a081c05a88dab0cfa2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipCreatePen1
GdiplusStartup
GdipFree
GdipGetImageWidth
GdipDeletePen
GdipCloneImage
GdipGetImageHeight
GdipAlloc
GdipDrawImageRect
GdipDrawLineI
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateBitmapFromStream
GdipDisposeImage
comctl32
InitCommonControlsEx
ord17
shlwapi
PathFindFileNameW
PathAddBackslashW
SHDeleteKeyW
PathFileExistsW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
wininet
InternetCanonicalizeUrlW
kernel32
GetModuleFileNameW
GetStdHandle
LoadLibraryExW
GetConsoleMode
GetConsoleCP
GetLastError
GetModuleHandleW
CompareFileTime
CreateDirectoryW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
GetFileSize
GetFileTime
ReadFile
RemoveDirectoryW
SetFileAttributesW
SetFilePointer
WriteFile
CloseHandle
WaitForSingleObject
Sleep
CreateProcessW
GetProcAddress
LoadLibraryW
LocalFree
FormatMessageW
MoveFileExW
VerSetConditionMask
VerifyVersionInfoW
FreeLibrary
FindResourceExW
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalUnlock
GlobalLock
GetThreadUILanguage
GetTempPathW
GetCurrentProcess
ExitProcess
OpenProcess
CompareStringW
ExpandEnvironmentStringsW
GetCurrentThread
GetCurrentDirectoryW
LocalFileTimeToFileTime
SetFileTime
SystemTimeToFileTime
MultiByteToWideChar
WideCharToMultiByte
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
RtlUnwind
RaiseException
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringEx
DecodePointer
EncodePointer
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetStringTypeW
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
GetModuleHandleExW
HeapFree
HeapAlloc
GetFileType
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
FlushFileBuffers
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetProcessHeap
HeapSize
WriteConsoleW
SetEndOfFile
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
user32
TranslateMessage
GetMessageW
LoadAcceleratorsW
SetForegroundWindow
UpdateWindow
IsIconic
HideCaret
InvalidateRect
KillTimer
SetTimer
IsWindow
GetDlgCtrlID
SendDlgItemMessageW
SetFocus
GetDlgItem
PeekMessageW
LoadCursorW
SetClassLongW
SetWindowLongW
GetWindowLongW
FillRect
GetSysColorBrush
GetSysColor
ClientToScreen
MessageBoxW
GetWindowRect
GetClientRect
SetWindowTextW
GetPropW
SetPropW
EndPaint
BeginPaint
EnableWindow
SetWindowPos
ShowWindow
CreateWindowExW
RegisterClassExW
PostQuitMessage
DefWindowProcW
SendMessageW
TranslateAcceleratorW
GetParent
IsDialogMessageW
SystemParametersInfoW
MonitorFromRect
DispatchMessageW
GetMonitorInfoW
GetShellWindow
GetWindowThreadProcessId
CreateDialogParamW
LoadIconW
gdi32
CreateCompatibleBitmap
CreateFontIndirectW
DeleteDC
DeleteObject
SelectObject
CreateCompatibleDC
BitBlt
shell32
SHChangeNotify
SHBrowseForFolderW
SHGetPathFromIDListW
SHFileOperationW
SHGetSpecialFolderLocation
ShellExecuteW
SHGetSpecialFolderPathW
SHGetKnownFolderPath
ole32
CoCreateInstance
CoTaskMemFree
CreateStreamOnHGlobal
CoInitialize
advapi32
AllocateAndInitializeSid
RevertToSelf
ImpersonateSelf
DuplicateTokenEx
OpenThreadToken
OpenProcessToken
RegSetValueExW
RegQueryValueExW
CheckTokenMembership
FreeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegOpenKeyExW
Sections
.text Size: 433KB - Virtual size: 433KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 467.5MB - Virtual size: 467.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ