Static task
static1
Behavioral task
behavioral1
Sample
26a515e99be553ff82bec94c552d5a6d8fd661a8c8af755fdee4456886205230.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
26a515e99be553ff82bec94c552d5a6d8fd661a8c8af755fdee4456886205230.exe
Resource
win10v2004-20240426-en
General
-
Target
26a515e99be553ff82bec94c552d5a6d8fd661a8c8af755fdee4456886205230
-
Size
312KB
-
MD5
a62951df89ec3edfc43b881ddcd84eda
-
SHA1
0d746b64d231b9af0e88f6f374c31b52f996a584
-
SHA256
26a515e99be553ff82bec94c552d5a6d8fd661a8c8af755fdee4456886205230
-
SHA512
9aa2d61f1dbc3631caeb00767df57d6489ce5d30497087a8415eb72dc2fc64418c6032edd0e5c4f6742e103911c8f080f5494da7d27244c0ad4c456dfbed35bb
-
SSDEEP
6144:5Rdol3nlYhSftdGoZFRu5Runn/vLAobnkde:DdElYMk5UnnNk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 26a515e99be553ff82bec94c552d5a6d8fd661a8c8af755fdee4456886205230
Files
-
26a515e99be553ff82bec94c552d5a6d8fd661a8c8af755fdee4456886205230.exe windows:4 windows x86 arch:x86
844f9738fa77df66c4278e2ec7d6ad43
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmGetIMEFileNameW
netapi32
DsRoleGetPrimaryDomainInformation
NetApiBufferFree
DsRoleFreeMemory
DsGetDcNameW
mpr
WNetEnumResourceW
WNetOpenEnumW
kernel32
GlobalUnlock
GlobalLock
FileTimeToSystemTime
FileTimeToLocalFileTime
InterlockedDecrement
GetThreadLocale
GetCurrentProcessId
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetVersion
lstrcmpW
GlobalFlags
CompareStringW
GetCurrentThreadId
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
InterlockedExchange
CompareStringA
SetLastError
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetFullPathNameW
GetFileAttributesW
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
HeapReAlloc
RtlUnwind
RaiseException
HeapSize
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualAlloc
Sleep
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetCurrentDirectoryA
GetDriveTypeA
CreateFileA
SetEnvironmentVariableA
FindFirstFileW
FindResourceW
FreeLibrary
LoadResource
LoadLibraryExW
GetCurrentProcess
SizeofResource
FormatMessageW
GetVersionExW
CreateFileW
MultiByteToWideChar
GetLastError
lstrlenW
WideCharToMultiByte
FindClose
LocalAlloc
LockResource
FindNextFileW
CloseHandle
LocalFree
GlobalAlloc
GlobalFree
GetModuleHandleW
LoadLibraryW
GetProcAddress
CreateFileMappingW
MapViewOfFile
GetSystemDefaultLangID
GetWindowsDirectoryW
CopyFileW
DeleteFileW
MoveFileW
MoveFileExW
GetCommandLineW
GetSystemDirectoryW
GetModuleFileNameW
CreateMutexW
SetCurrentDirectoryW
GetCurrentDirectoryW
UnmapViewOfFile
ReleaseMutex
user32
WinHelpW
RegisterWindowMessageW
CheckMenuItem
EnableMenuItem
ModifyMenuW
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
UnregisterClassA
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
AdjustWindowRectEx
CopyRect
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
GetCapture
GetKeyState
PeekMessageW
ValidateRect
SetWindowLongW
IsWindow
GetDlgItem
GetFocus
ClientToScreen
GetDlgCtrlID
PtInRect
SetWindowTextW
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
SendMessageW
GetWindow
RegisterClassW
DialogBoxParamW
MessageBoxW
GetWindowRect
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
GetClassLongW
SetPropW
GetPropW
FindWindowExW
LoadIconW
GetKeyboardLayoutList
LoadKeyboardLayoutW
SendMessageTimeoutW
GetClassNameW
EnumWindows
UnloadKeyboardLayout
SetWindowPos
SystemParametersInfoW
ShowWindow
EndDialog
ActivateKeyboardLayout
RemovePropW
GetForegroundWindow
EnableWindow
GetWindowTextW
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
advapi32
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyW
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
SetSecurityInfo
GetSecurityDescriptorSacl
RegCloseKey
ConvertSecurityDescriptorToStringSecurityDescriptorW
ConvertSidToStringSidW
AdjustTokenPrivileges
RegEnumKeyExW
SetSecurityDescriptorSacl
GetLengthSid
IsValidSecurityDescriptor
AddAce
RegOpenKeyExW
IsValidSid
SetEntriesInAclW
ConvertStringSecurityDescriptorToSecurityDescriptorW
AddAccessAllowedAce
SetSecurityDescriptorOwner
InitializeAcl
SetKernelObjectSecurity
MakeAbsoluteSD
GetNamedSecurityInfoW
RegConnectRegistryW
LookupAccountSidW
GetAce
LookupPrivilegeValueW
SetNamedSecurityInfoW
SetSecurityDescriptorDacl
LookupAccountNameW
ConvertStringSidToSidW
InitializeSecurityDescriptor
EqualSid
GetSecurityDescriptorControl
RegCreateKeyExW
CopySid
GetAclInformation
GetKernelObjectSecurity
MapGenericMask
SetSecurityDescriptorGroup
DeleteAce
SetSecurityDescriptorControl
OpenProcessToken
IsValidAcl
oleacc
CreateStdAccessibleObject
LresultFromObject
gdi32
DeleteDC
CreateBitmap
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 192KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE