Static task
static1
Behavioral task
behavioral1
Sample
67a9549b84daf1455ad0510fb564342c798e073e25c4a0d3ae48cb99f1aa44e1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
67a9549b84daf1455ad0510fb564342c798e073e25c4a0d3ae48cb99f1aa44e1.exe
Resource
win10v2004-20240611-en
General
-
Target
67a9549b84daf1455ad0510fb564342c798e073e25c4a0d3ae48cb99f1aa44e1
-
Size
204KB
-
MD5
19a822deed78bafdc4e293aa8fc8cd05
-
SHA1
463c89991d9a442fb03c3a93f276a9f7d1ac1d83
-
SHA256
67a9549b84daf1455ad0510fb564342c798e073e25c4a0d3ae48cb99f1aa44e1
-
SHA512
44eac640905edb6123d8205cd5d02ed4c2b6f58d4a9f50a4005acff563c61f0596932a045e360457251e0ccd60f5a433acf9f4ffab3889b3d45884c58f59f9b7
-
SSDEEP
3072:bdGaTPrrIGvvyy8dHSi+OcGMrOpOVKdOyMbkrWRdg+E2uEPczTinJhV+p9GEVFU/:pGazIc6TVBMrOpzeJEsuirSGEMpgE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67a9549b84daf1455ad0510fb564342c798e073e25c4a0d3ae48cb99f1aa44e1
Files
-
67a9549b84daf1455ad0510fb564342c798e073e25c4a0d3ae48cb99f1aa44e1.exe windows:4 windows x86 arch:x86
e12f72e7fe59535708698b4de0340a02
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
GetWindowsDirectoryW
SetErrorMode
CreateFileMappingA
GetComputerNameA
QueryPerformanceCounter
GetModuleFileNameA
SetPriorityClass
lstrcpyn
GetFileType
InitializeCriticalSection
GetLogicalDrives
GetProcessHeap
GetNumberFormatA
LocalAlloc
CreateEventW
GetTimeFormatA
GetVersionExW
GetProcessHeaps
CopyFileExW
GetHandleInformation
GlobalGetAtomNameA
FlushFileBuffers
CreateNamedPipeW
CopyFileA
GetCurrentDirectoryA
OpenWaitableTimerW
GetCommandLineW
lstrlen
CopyFileExA
FreeLibrary
SetComputerNameW
GetProcAddress
EnumCalendarInfoA
FindAtomA
GetModuleHandleW
CreatePipe
OpenProcess
CreateMailslotW
BeginUpdateResourceW
IsDebuggerPresent
GetVersionExA
GetEnvironmentStringsW
GetModuleHandleA
user32
GetSysColorBrush
RegisterClassExW
GetWindowLongA
SetMenu
ArrangeIconicWindows
DialogBoxParamW
LoadIconW
CreateIcon
CharNextA
GetMessageW
LoadImageA
TrackPopupMenuEx
mouse_event
GetParent
OpenClipboard
LoadIconW
GetIconInfo
CheckRadioButton
GetIconInfo
GetWindowTextW
OffsetRect
SetWindowPos
GetMenuStringW
CopyRect
EnumWindows
SetFocus
SetDlgItemInt
GetSystemMetrics
GetWindowTextLengthA
GetCapture
GetMenuItemCount
EnumDesktopsA
DestroyCursor
GetClassInfoExA
UpdateLayeredWindow
MonitorFromWindow
FrameRect
EnumChildWindows
FindWindowA
LoadBitmapW
RegisterClassExA
CloseWindow
IsMenu
MessageBeep
AdjustWindowRect
EnumDesktopWindows
DeleteMenu
MonitorFromRect
IsWindow
gdi32
ExtFloodFill
ExtEscape
EqualRgn
CopyEnhMetaFileW
SetPixelFormat
ResetDCW
CreatePolygonRgn
CreateDCA
SetTextJustification
GetKerningPairsA
GetDCPenColor
SetPaletteEntries
AbortPath
CreatePolyPolygonRgn
GetBkMode
advapi32
RegOpenKeyA
RegQueryValueW
RegReplaceKeyW
RegCreateKeyExW
RegRestoreKeyA
oleaut32
CreateDispTypeInfo
opengl32
glColor3iv
winspool.drv
SetPortW
AddPortExW
ScheduleJob
PrinterProperties
XcvDataW
FindNextPrinterChangeNotification
EnumPrintProcessorDatatypesW
SetPortA
ResetPrinterW
oledlg
OleUIInsertObjectA
wsock32
WSARecvEx
WSASetBlockingHook
shutdown
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.oqngCF Size: 1KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.N Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LUV Size: 1024B - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.GOTYM Size: 2KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AGbvFQ Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kkPQAu Size: 512B - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ