Static task
static1
Behavioral task
behavioral1
Sample
cb89f9455228874d5eb425991d26c1099f80dc8841428c77dd7a56d98975c0e6.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
cb89f9455228874d5eb425991d26c1099f80dc8841428c77dd7a56d98975c0e6.exe
Resource
win10v2004-20240611-en
General
-
Target
cb89f9455228874d5eb425991d26c1099f80dc8841428c77dd7a56d98975c0e6
-
Size
1.8MB
-
MD5
c5dbee8ca57d622f48044d09dcd89e9d
-
SHA1
9676ffa8e767774534de9a2f30ec86106ecd1a67
-
SHA256
cb89f9455228874d5eb425991d26c1099f80dc8841428c77dd7a56d98975c0e6
-
SHA512
1eb4d51e9905052e182b71ce78882bda6eb3e4a3aed6b8dd2bb9dd42b9ded2909280b994a483acfd5fbdfb1b4028b5916770333bc215c62ab4464e4d907ae6ac
-
SSDEEP
24576:AxrR5xTdYCAQx76y2//s6zpLzTOil2Kwoa4Yf0MR:0hYCAvHjJwlf0MR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cb89f9455228874d5eb425991d26c1099f80dc8841428c77dd7a56d98975c0e6
Files
-
cb89f9455228874d5eb425991d26c1099f80dc8841428c77dd7a56d98975c0e6.exe windows:4 windows x86 arch:x86
852a7eb07deb4bc81e773d08bcde5145
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
SetConsoleCtrlHandler
SetStdHandle
GetACP
GetOEMCP
SetEnvironmentVariableA
GetExitCodeThread
CompareStringA
FatalAppExitA
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCommandLineA
GetCommandLineW
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetLocalTime
GetSystemTime
GetTimeZoneInformation
HeapSize
HeapReAlloc
ExitThread
CreateThread
HeapFree
HeapAlloc
RaiseException
RtlUnwind
ExitProcess
GetStartupInfoW
CopyFileW
GlobalSize
SetFileAttributesW
SetFileTime
GetWindowsDirectoryA
CreateFileMappingA
DefineDosDeviceW
GetDiskFreeSpaceExW
SetVolumeLabelW
QueryDosDeviceA
GetLogicalDrives
GetDriveTypeW
GetDriveTypeA
FindResourceA
GlobalAddAtomA
GetProfileStringA
QueryPerformanceCounter
VirtualProtectEx
WriteProcessMemory
VirtualQuery
VirtualProtect
GetFileInformationByHandle
VirtualQueryEx
InterlockedExchangeAdd
InterlockedCompareExchange
CreateProcessA
ReadProcessMemory
GetThreadPriority
GetPriorityClass
SetPriorityClass
TerminateThread
BackupRead
BackupSeek
BackupWrite
GetFileAttributesExW
AllocConsole
WriteConsoleW
FreeConsole
OpenFileMappingW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
MoveFileExW
MoveFileExA
FindNextFileW
FindFirstFileA
FindNextFileA
RemoveDirectoryW
CreateDirectoryW
RemoveDirectoryA
CopyFileA
CreateDirectoryA
MoveFileA
DeleteFileA
GetFileAttributesA
SetFileAttributesA
GetTempPathW
GetTempPathA
GetCurrentDirectoryA
GetSystemDirectoryA
ExpandEnvironmentStringsA
CreateFileA
OpenSemaphoreW
CancelIo
GetOverlappedResult
CreateNamedPipeW
ConnectNamedPipe
WaitNamedPipeW
SetNamedPipeHandleState
GetSystemInfo
WaitForMultipleObjects
PulseEvent
ReleaseMutex
ReleaseSemaphore
CreateSemaphoreW
InterlockedExchange
SleepEx
GetVersionExW
FindResourceExW
FormatMessageA
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileTime
GetFileSize
FileTimeToLocalFileTime
FileTimeToSystemTime
GetShortPathNameW
GetStringTypeExW
GetVolumeInformationW
DeleteFileW
MoveFileW
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
SetErrorMode
GlobalGetAtomNameW
GetThreadLocale
WritePrivateProfileStringW
GetPrivateProfileIntW
FormatMessageW
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
SizeofResource
GlobalFlags
lstrcmpiW
MulDiv
SetLastError
SuspendThread
SetThreadPriority
lstrcmpW
GlobalAlloc
lstrcmpA
lstrcmpiA
GetCurrentThread
lstrcpynW
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetModuleHandleA
LoadLibraryA
lstrlenA
MultiByteToWideChar
lstrcatW
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
lstrcpyW
GetModuleHandleW
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceW
LoadResource
GetCurrentThreadId
GetTickCount
CreateMutexW
DeviceIoControl
GetProcAddress
GetPrivateProfileStringW
GetProfileStringW
GetFullPathNameW
QueryDosDeviceW
GetCurrentDirectoryW
FindFirstFileW
FindClose
OpenMutexW
Sleep
OpenEventW
GetFileAttributesW
GetEnvironmentVariableW
SetEnvironmentVariableW
OutputDebugStringW
ResumeThread
GetLastError
SetEvent
CreateEventW
ResetEvent
GetLongPathNameW
GetModuleFileNameW
OpenProcess
GetCurrentProcessId
CreateFileW
GetSystemDirectoryW
CreateProcessW
CloseHandle
WaitForSingleObject
TerminateProcess
ExpandEnvironmentStringsW
GetVersion
GetUserDefaultLangID
GetSystemDefaultLangID
GetLocaleInfoW
FreeLibrary
LoadLibraryW
CompareStringW
user32
TabbedTextOutW
DrawTextW
GrayStringW
GetClassNameW
PtInRect
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
DestroyMenu
MapDialogRect
SetWindowContextHelpId
GetMessageW
TranslateMessage
ValidateRect
GetCursorPos
SetCursor
AppendMenuW
GetSystemMenu
DrawIcon
GetClientRect
GetDesktopWindow
IsIconic
IsWindowEnabled
GetDlgItem
GetWindowLongW
GetParent
DestroyWindow
CreateDialogIndirectParamW
IsWindow
SetActiveWindow
GetActiveWindow
EndDialog
GetNextDlgTabItem
GetWindowRect
GetSysColorBrush
SystemParametersInfoW
IntersectRect
OffsetRect
RegisterWindowMessageW
SetWindowPos
SetWindowLongW
GetWindow
SetForegroundWindow
GetForegroundWindow
GetLastActivePopup
GetMessagePos
UnregisterClassW
EnumDesktopWindows
EnumDesktopsW
EnumWindowStationsW
OpenInputDesktop
GetDialogBaseUnits
GetSystemMetrics
InflateRect
LoadStringW
SetCapture
ReleaseCapture
WaitMessage
GetWindowThreadProcessId
WindowFromPoint
InsertMenuW
DeleteMenu
GetMenuStringW
CharNextW
CopyAcceleratorTableW
SetRect
MessageBoxW
EnableWindow
CreateDesktopW
CloseDesktop
SetFocus
SendMessageW
LoadCursorW
LoadIconW
GetNextDlgGroupItem
MessageBeep
SetRectEmpty
LoadAcceleratorsW
TranslateAcceleratorW
LoadMenuW
SetMenu
ReuseDDElParam
UnpackDDElParam
InvalidateRect
BringWindowToTop
CharUpperW
RegisterClipboardFormatW
RemoveMenu
PostThreadMessageW
OpenDesktopW
GetThreadDesktop
SetThreadDesktop
OpenWindowStationW
SetProcessWindowStation
CloseWindowStation
GetWindowTextLengthA
HideCaret
ShowCaret
ExcludeUpdateRgn
GetWindowTextA
DrawTextA
DrawFocusRect
GetClassInfoA
DefDlgProcA
DefWindowProcA
CharNextA
CallWindowProcA
RemovePropA
SetWindowsHookExA
GetWindowLongA
SendMessageA
IsWindowUnicode
GetClassNameA
SetWindowLongA
SetPropA
GetPropA
MessageBoxA
DestroyIcon
GetWindowPlacement
ShowOwnedPopups
PostQuitMessage
wvsprintfW
GetDC
ReleaseDC
GetMenuCheckMarkDimensions
LoadBitmapW
GetMenuState
ModifyMenuW
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
ScrollWindowEx
IsDlgButtonChecked
SetDlgItemTextW
SetDlgItemInt
GetDlgItemTextW
GetDlgItemInt
CheckRadioButton
CheckDlgButton
PostMessageW
UpdateWindow
SendDlgItemMessageW
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageW
DispatchMessageW
GetFocus
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
IsWindowVisible
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpW
wsprintfW
GetClassInfoW
RegisterClassW
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
TrackPopupMenu
SetWindowPlacement
GetWindowTextLengthW
GetWindowTextW
GetDlgCtrlID
GetKeyState
CreateWindowExW
SetWindowsHookExW
CallNextHookEx
SetPropW
UnhookWindowsHookEx
GetPropW
CallWindowProcW
RemovePropW
DefWindowProcW
GetMessageTime
MsgWaitForMultipleObjects
CloseWindow
FindWindowW
GetUserObjectInformationW
GetProcessWindowStation
gdi32
GetClipBox
GetDCOrgEx
RectVisible
TextOutW
ExtTextOutW
Escape
GetTextExtentPoint32W
GetTextMetricsW
CreateFontIndirectW
GetMapMode
SetRectRgn
CombineRgn
DPtoLP
SelectPalette
GetBkColor
LPtoDP
CopyMetaFileW
CreateDCW
SetBkMode
SetTextColor
SetROP2
SetStretchBltMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
IntersectClipRect
OffsetClipRgn
MoveToEx
LineTo
SetTextAlign
SetTextJustification
SetTextCharacterExtra
SetMapperFlags
SetBkColor
GetObjectW
CreateBitmap
PatBlt
CreateRectRgnIndirect
DeleteDC
StartDocW
SaveDC
RestoreDC
SelectObject
SetPolyFillMode
GetStockObject
GetBitmapBits
BitBlt
GetObjectA
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
ExtTextOutA
GetTextExtentPointA
CreateDIBitmap
GetCurrentPositionEx
ArcTo
SetArcDirection
PolyDraw
PolylineTo
SetColorAdjustment
PolyBezierTo
DeleteObject
GetClipRgn
CreateRectRgn
SelectClipPath
ExtSelectClipRgn
PlayMetaFileRecord
GetObjectType
EnumMetaFile
PlayMetaFile
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
CreatePen
ExtCreatePen
CreateSolidBrush
CreateHatchBrush
CreatePatternBrush
CreateDIBPatternBrushPt
GetTextColor
SetWindowExtEx
PtVisible
comdlg32
GetFileTitleW
GetOpenFileNameW
GetSaveFileNameW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
QueryServiceStatus
RegSetKeySecurity
SetFileSecurityW
GetTokenInformation
LookupAccountSidW
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
GetAce
SetSecurityDescriptorDacl
LookupAccountNameW
RegisterEventSourceA
ReportEventA
DeregisterEventSource
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetUserNameW
RegCreateKeyExA
RegCreateKeyA
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExA
RegQueryValueExA
RegConnectRegistryW
RegCreateKeyW
RegEnumKeyW
RegQueryValueW
RegSetValueW
RegOpenKeyW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
ControlService
StartServiceW
OpenServiceW
DeleteService
OpenSCManagerW
LockServiceDatabase
CreateServiceW
CloseServiceHandle
UnlockServiceDatabase
RegOpenKeyA
shell32
SHGetSpecialFolderPathW
DragQueryFileW
DragFinish
DragAcceptFiles
FindExecutableW
ExtractIconW
SHGetFileInfoW
ShellExecuteExW
SHFileOperationW
comctl32
ImageList_Read
ImageList_Merge
ImageList_LoadImageW
ImageList_Create
ImageList_Destroy
ord14
ord13
ord17
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Write
oledlg
OleUIBusyW
ole32
CoTreatAsClass
StringFromCLSID
ReadClassStg
ReadFmtUserTypeStg
OleRegGetUserType
WriteClassStg
WriteFmtUserTypeStg
SetConvertStg
CreateBindCtx
OleDuplicateData
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
OleSetClipboard
OleRun
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoRegisterClassObject
OleFlushClipboard
OleIsCurrentClipboard
CreateStreamOnHGlobal
CoDisconnectObject
CoRevokeClassObject
ReleaseStgMedium
olepro32
ord253
oleaut32
LoadTypeLi
SysStringLen
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayDestroy
SafeArrayUnlock
SafeArrayLock
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayGetElement
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayCopy
VarBstrFromDate
VarDateFromStr
VarBstrFromCy
VarCyFromStr
SysAllocStringByteLen
SysStringByteLen
SafeArrayRedim
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocString
SysReAllocStringLen
VariantChangeType
VariantCopy
VariantTimeToSystemTime
VariantClear
SysAllocStringLen
SysFreeString
DosDateTimeToVariantTime
ws2_32
send
getsockopt
getsockname
getpeername
ntohs
listen
shutdown
closesocket
recv
socket
WSAIoctl
htons
htonl
bind
accept
setsockopt
WSACleanup
WSAStartup
gethostbyname
ntohl
WSAGetLastError
recvfrom
connect
sendto
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
mpr
WNetGetConnectionW
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 156KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 308KB - Virtual size: 307KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ