Static task
static1
Behavioral task
behavioral1
Sample
d99a18048e6f57a0076ba4073f057e72413041ee6ea942580aa30c7c2dc04466.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d99a18048e6f57a0076ba4073f057e72413041ee6ea942580aa30c7c2dc04466.exe
Resource
win10v2004-20240508-en
General
-
Target
d99a18048e6f57a0076ba4073f057e72413041ee6ea942580aa30c7c2dc04466
-
Size
790KB
-
MD5
191a82e26c50a998d538bc52eaf72494
-
SHA1
b3c5b548853673f0bb35fe654d8bd35d4fede959
-
SHA256
d99a18048e6f57a0076ba4073f057e72413041ee6ea942580aa30c7c2dc04466
-
SHA512
e78d639c516ed12e301b4227fb5a5767586f384ff75d2289eccf637c1ed655b81039fb26e78e1590d7303ed251b522910c27942c70151ea284c5bf907df8127a
-
SSDEEP
12288:JOG2Q8xhnDIn3np0S5nb41pGXtypRutEgNDHG99pW4FD7gn7DeugGpFZXgyJXOxF:JV8xt+YSypRu57+gnvn7jZnXKEW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d99a18048e6f57a0076ba4073f057e72413041ee6ea942580aa30c7c2dc04466
Files
-
d99a18048e6f57a0076ba4073f057e72413041ee6ea942580aa30c7c2dc04466.exe windows:5 windows x86 arch:x86
cdcb994df2601e57f95781071ecefccc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
kernel32
LoadLibraryA
FormatMessageA
Sleep
WriteFile
FlushFileBuffers
SetFilePointer
CloseHandle
GetDriveTypeW
CreateDirectoryW
CreateFileW
InterlockedDecrement
GetProcAddress
GetLongPathNameW
OpenProcess
GetCurrentProcess
GetLastError
LoadResource
GetFileSize
ReadFile
FindClose
GetSystemInfo
lstrlenW
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
FindResourceExW
GetCurrentDirectoryW
RemoveDirectoryW
QueryDosDeviceW
SetFileAttributesW
GetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
GetVersionExW
WideCharToMultiByte
GetUserDefaultLangID
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Module32FirstW
Module32NextW
GetCurrentThreadId
WaitForSingleObject
CreateProcessW
CopyFileW
GetExitCodeProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
GetCurrentProcessId
ReleaseMutex
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
LocalFree
RaiseException
RtlUnwind
FreeLibrary
LoadLibraryExW
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetACP
HeapAlloc
HeapReAlloc
HeapFree
CreateProcessA
GetFileAttributesExW
GetFileType
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
CreateThread
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
GetProcessHeap
HeapSize
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
CreateMutexW
QueryPerformanceFrequency
GetTempPathW
DuplicateHandle
ReadConsoleW
MoveFileExW
CreatePipe
SetEndOfFile
GetSystemTimeAsFileTime
MultiByteToWideChar
ole32
CoInitializeEx
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoSetProxyBlanket
oleaut32
VariantClear
SysFreeString
VariantInit
SysAllocString
shlwapi
PathRemoveFileSpecW
msi
ord113
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
user32
ShowWindow
DestroyWindow
CreateDialogParamW
GetDlgItem
SetDlgItemTextW
GetSystemMetrics
SendMessageW
PostMessageW
DispatchMessageW
GetDC
LoadIconW
SetWindowTextW
MessageBoxW
SetWindowsHookExW
UnhookWindowsHookEx
TranslateMessage
GetMessageW
GetWindowPlacement
IsWindow
CallNextHookEx
SetWindowPlacement
IsDialogMessageW
gdi32
GetTextExtentPoint32W
advapi32
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
shell32
SHGetFolderPathW
ord165
SHCreateDirectoryExW
Sections
.text Size: 426KB - Virtual size: 426KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 221KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ