Static task
static1
Behavioral task
behavioral1
Sample
0e6d71059d6177cc49b6645caf48417ae4d5619f212bf79012904e00f72ec037.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0e6d71059d6177cc49b6645caf48417ae4d5619f212bf79012904e00f72ec037.exe
Resource
win10v2004-20240508-en
General
-
Target
0e6d71059d6177cc49b6645caf48417ae4d5619f212bf79012904e00f72ec037
-
Size
11.1MB
-
MD5
19e74cc98ac62eede49bc484fc00f8c1
-
SHA1
b1cd57f124ffead9927ff2a22902189a00e1edd8
-
SHA256
0e6d71059d6177cc49b6645caf48417ae4d5619f212bf79012904e00f72ec037
-
SHA512
541cf71a8db623f21d287f568573b0ae9d7f42beb00590f6a8e7264be9d9db98d31640ff185af1ed27e376ec83ae5514f0477481b56952364a8654408b3fe087
-
SSDEEP
196608:dfQox3vvvjoCf8Teis+EJsv6tWKFdu9C8d:d3lvzikJsv6tWKFdu9Ca
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e6d71059d6177cc49b6645caf48417ae4d5619f212bf79012904e00f72ec037
Files
-
0e6d71059d6177cc49b6645caf48417ae4d5619f212bf79012904e00f72ec037.exe windows:5 windows x86 arch:x86
b8db1777845547f1c40066864b2cd626
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
GetFileType
ReadFile
SetEndOfFile
SetFilePointerEx
WriteFile
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
MoveFileExW
MultiByteToWideChar
WideCharToMultiByte
FindFirstFileExW
FindNextFileW
FreeLibrary
GetModuleHandleExW
GetTimeZoneInformation
GetGeoInfoW
GetUserGeoID
ExitProcess
DisconnectNamedPipe
WaitNamedPipeW
ConnectNamedPipe
CreateNamedPipeW
GetOverlappedResult
SetHandleInformation
GetVolumeInformationW
lstrcmpW
GetDriveTypeW
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineA
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
AreFileApisANSI
ExitThread
FileTimeToSystemTime
FindClose
LeaveCriticalSection
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetFileAttributesW
SetStdHandle
HeapSize
SetLastError
GetProcessHeap
GetStdHandle
DeleteCriticalSection
GetModuleFileNameA
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetEnvironmentVariableA
WriteConsoleW
LCMapStringW
EnumSystemLocalesW
GetStringTypeW
FindFirstChangeNotificationW
FindCloseChangeNotification
WriteFileEx
GetModuleHandleA
SleepEx
CancelIo
PeekNamedPipe
ReadFileEx
VirtualFree
VirtualAlloc
CreateMutexW
ReleaseMutex
InitializeCriticalSection
SystemTimeToTzSpecificLocalTime
MoveFileW
DeviceIoControl
CopyFileW
SetErrorMode
GetTempPathW
RemoveDirectoryW
GetLongPathNameW
GetLogicalDrives
GetFullPathNameW
GetFileInformationByHandle
GetFileAttributesW
LoadLibraryExW
FindFirstFileW
DeleteFileW
CreateDirectoryW
GetCurrentDirectoryW
GetFileAttributesExW
CreateFileW
GetModuleFileNameW
GetStartupInfoW
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
GetUserDefaultUILanguage
GetCurrencyFormatW
GetTimeFormatW
GetDateFormatW
ResetEvent
LoadLibraryW
GetSystemDirectoryW
WaitForSingleObjectEx
GetConsoleWindow
OutputDebugStringW
WaitForMultipleObjects
GetSystemInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
ResumeThread
TerminateThread
GetThreadPriority
SetThreadPriority
GetCurrentThread
CreateThread
Sleep
FindNextChangeNotification
CreateEventW
WaitForSingleObject
SetEvent
DuplicateHandle
GetLocalTime
GetSystemTime
GetCommandLineW
GetUserDefaultLCID
CompareStringW
GlobalSize
GetCurrentProcessId
LoadLibraryA
GetLocaleInfoW
GlobalUnlock
GlobalLock
GlobalAlloc
OpenProcess
CheckRemoteDebuggerPresent
GetUserDefaultLangID
CreateProcessW
ExpandEnvironmentStringsW
IsValidLocale
IsValidLanguageGroup
FormatMessageW
LocalFree
GetProcAddress
GetModuleHandleW
GetCurrentThreadId
GetLastError
CreateProcessA
CloseHandle
SetUnhandledExceptionFilter
TerminateProcess
EnterCriticalSection
GetCurrentProcess
user32
GetDoubleClickTime
MessageBeep
GetCaretBlinkTime
GetDesktopWindow
SystemParametersInfoW
SendMessageW
PostMessageW
AttachThreadInput
DefWindowProcW
CreateWindowExW
IsChild
DestroyWindow
ShowWindow
FlashWindowEx
MoveWindow
SetWindowPos
GetWindowPlacement
SetWindowPlacement
IsWindowVisible
TranslateMessage
RealGetWindowClassW
EnumWindows
GetWindowTextW
GetMessageExtraInfo
TrackMouseEvent
GetClipboardFormatNameW
RegisterClassW
GetCursorInfo
GetIconInfo
CreateIconIndirect
CreateCursor
LoadCursorW
GetCursor
SetCursorPos
NotifyWinEvent
SetMenuItemInfoW
TrackPopupMenuEx
GetMenu
MapVirtualKeyW
ToUnicode
ToAscii
GetKeyboardState
GetKeyState
IsZoomed
SetFocus
GetCapture
SetCapture
ReleaseCapture
GetSystemMetrics
GetSystemMenu
EnableMenuItem
DrawIconEx
MessageBoxW
CharNextExA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
KillTimer
SetTimer
MsgWaitForMultipleObjectsEx
GetQueueStatus
IsIconic
DispatchMessageW
GetForegroundWindow
SetForegroundWindow
GetDC
ReleaseDC
BeginPaint
EndPaint
GetUpdateRect
GetSysColor
SetWindowRgn
InvalidateRect
SetWindowTextW
GetWindowRect
AdjustWindowRectEx
PeekMessageW
SetCaretPos
HideCaret
DestroyCaret
CreateCaret
RegisterWindowMessageW
GetKeyboardLayout
GetAsyncKeyState
RegisterClipboardFormatW
ChangeClipboardChain
SetClipboardViewer
LoadIconW
EnumDisplayMonitors
GetMonitorInfoW
LoadImageW
GetSysColorBrush
ChildWindowFromPointEx
GetCursorPos
GetClientRect
GetFocus
RegisterClassExW
GetClassInfoW
UnregisterClassW
GetKeyboardLayoutList
GetAncestor
DestroyIcon
DestroyCursor
GetWindowThreadProcessId
SetParent
GetParent
SetWindowLongW
GetWindowLongW
ScreenToClient
ClientToScreen
SetCursor
shell32
SHGetPathFromIDListW
Shell_NotifyIconW
SHGetSpecialFolderPathW
SHGetFileInfoW
ShellExecuteW
SHGetMalloc
SHBrowseForFolderW
CommandLineToArgvW
ole32
StringFromGUID2
CoTaskMemAlloc
CoGetMalloc
ReleaseStgMedium
CoTaskMemFree
DoDragDrop
CoCreateInstance
OleIsCurrentClipboard
OleFlushClipboard
OleGetClipboard
OleSetClipboard
CoCreateGuid
CoInitialize
OleUninitialize
OleInitialize
RevokeDragDrop
RegisterDragDrop
CoLockObjectExternal
CoUninitialize
advapi32
RegCloseKey
RegQueryValueExW
OpenProcessToken
CopySid
FreeSid
GetLengthSid
GetTokenInformation
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegFlushKey
RegQueryInfoKeyW
RegSetValueExW
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
RegOpenKeyExW
ws2_32
WSASendTo
WSASend
WSARecvFrom
WSANtohs
WSANtohl
WSAIoctl
WSAHtonl
WSAConnect
WSAAccept
setsockopt
select
listen
htons
getsockname
WSASocketW
closesocket
bind
__WSAFDIsSet
WSAGetLastError
gethostbyname
gethostbyaddr
ntohl
inet_addr
getsockopt
htonl
WSAAsyncSelect
WSACleanup
WSAStartup
gethostname
getpeername
WSARecv
gdi32
BitBlt
CreateRectRgn
DeleteObject
OffsetRgn
GetDeviceCaps
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
DeleteDC
SelectObject
EnumFontFamiliesExW
CreateFontIndirectW
GetFontData
GetStockObject
AddFontResourceExW
RemoveFontResourceExW
AddFontMemResourceEx
RemoveFontMemResourceEx
GetTextMetricsW
GetObjectW
GetTextFaceW
ChoosePixelFormat
DescribePixelFormat
GetPixelFormat
SetPixelFormat
SwapBuffers
CreateDIBSection
GdiFlush
GetBitmapBits
GetCharABCWidthsW
GetCharABCWidthsFloatW
GetGlyphOutlineW
GetOutlineTextMetricsW
GetTextExtentPoint32W
GetCharABCWidthsI
SetBkMode
SetGraphicsMode
SetTextColor
SetTextAlign
SetWorldTransform
ExtTextOutW
CreateBitmap
GetDIBits
GetRegionData
SelectClipRgn
CombineRgn
oleaut32
SysAllocString
SysFreeString
SysStringLen
VariantInit
VariantChangeType
SystemTimeToVariantTime
SysAllocStringLen
imm32
ImmGetDefaultIMEWnd
ImmReleaseContext
ImmAssociateContext
ImmGetCompositionStringW
ImmNotifyIME
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmGetVirtualKey
ImmGetContext
winmm
PlaySoundW
iphlpapi
GetAdaptersAddresses
GetAdaptersInfo
Sections
.text Size: 6.7MB - Virtual size: 6.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qtmetad Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 221KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ