Static task
static1
Behavioral task
behavioral1
Sample
d80b82911bdfaccf3d321a5856c2f895890f8a40acc165aa09be757cb59e1153.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d80b82911bdfaccf3d321a5856c2f895890f8a40acc165aa09be757cb59e1153.exe
Resource
win10v2004-20240508-en
General
-
Target
d80b82911bdfaccf3d321a5856c2f895890f8a40acc165aa09be757cb59e1153
-
Size
1.6MB
-
MD5
6cb1eec573f7d12790db4af7a5d388b2
-
SHA1
c356210503c95fda728a20eee37073f2f16b1169
-
SHA256
d80b82911bdfaccf3d321a5856c2f895890f8a40acc165aa09be757cb59e1153
-
SHA512
9f48106c6b3677efedcbee0e0a2605cb91b99781e24917f7bd27c0c9d3798363be66ed96e7a6f3e10ac7ac0a3a658e36e62e109346595b1dd0ecb673636d1412
-
SSDEEP
49152:Bu415iM6mpz9YxUT1BJbeLAX7ZFRmdoaNRLCZu:c4F6mpz9Y+FsA9Fg6uNCZu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d80b82911bdfaccf3d321a5856c2f895890f8a40acc165aa09be757cb59e1153
Files
-
d80b82911bdfaccf3d321a5856c2f895890f8a40acc165aa09be757cb59e1153.exe windows:5 windows x86 arch:x86
5aa2245ee6035dc32550f23424afb24d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
RtlUnwind
HeapReAlloc
RaiseException
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
GetSystemTimeAsFileTime
LCMapStringW
GetTimeZoneInformation
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetTickCount
GetFileSizeEx
FileTimeToLocalFileTime
SetErrorMode
GetFileTime
GetOEMCP
GetCPInfo
GetModuleHandleW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
TlsGetValue
LocalAlloc
FileTimeToSystemTime
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GlobalFlags
FindResourceExA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetFullPathNameA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetCurrentProcessId
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
FormatMessageA
LocalFree
MulDiv
InterlockedDecrement
GetModuleFileNameW
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GlobalLock
GlobalUnlock
WinExec
GetDiskFreeSpaceA
FreeLibrary
LocalFileTimeToFileTime
GetCurrentDirectoryA
CreateDirectoryA
ReadFile
GetFileAttributesA
SetFileTime
SystemTimeToFileTime
SetFilePointer
lstrcatA
GetLogicalDrives
GetVersion
FreeResource
GlobalReAlloc
GlobalFree
GlobalAlloc
lstrlenA
VirtualProtect
GetSystemInfo
CreateFileMappingA
VirtualAlloc
VirtualFree
FlushViewOfFile
UnmapViewOfFile
MapViewOfFile
TerminateThread
GetDriveTypeA
WaitForSingleObject
DeleteFileA
CloseHandle
GetVersionExA
GetModuleFileNameA
RemoveDirectoryA
Sleep
WriteFile
CreateFileA
ExitProcess
MultiByteToWideChar
lstrcpyA
FindNextFileA
FindClose
CopyFileA
FindFirstFileA
GetVolumeInformationA
GetModuleHandleA
LoadLibraryA
GetProcAddress
SetLastError
GetLastError
LockResource
SizeofResource
WideCharToMultiByte
LoadResource
FindResourceA
LCMapStringA
user32
PostQuitMessage
ValidateRect
CharUpperA
UnpackDDElParam
ReuseDDElParam
LoadMenuA
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
TranslateAcceleratorA
DestroyMenu
GetWindowThreadProcessId
EndPaint
BeginPaint
GetWindowDC
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
LoadIconA
SendDlgItemMessageA
WinHelpA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
GetForegroundWindow
GetMessageTime
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
ShowScrollBar
MessageBoxA
CreateWindowExA
GetClassInfoExA
AdjustWindowRectEx
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetDlgCtrlID
GetMenu
GetWindowPlacement
GetMenuStringA
InsertMenuA
RemoveMenu
UnhookWindowsHookEx
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
EnableMenuItem
CheckMenuItem
GetWindowTextLengthA
GetWindowTextA
GetScrollPos
SetScrollPos
ShowOwnedPopups
SetActiveWindow
MapDialogRect
ShowWindow
GetPropA
RemovePropA
SetFocus
GetDlgItem
IsWindowEnabled
IsZoomed
TranslateMessage
PeekMessageA
wsprintfA
DrawIconEx
CreateCursor
WindowFromPoint
SetParent
SetRectEmpty
GetUpdateRect
GetAsyncKeyState
IntersectRect
DestroyCursor
GetWindow
SetWindowLongA
CallWindowProcA
RegisterClassA
IsRectEmpty
GetKeyState
EqualRect
BeginDeferWindowPos
EndDeferWindowPos
GetMenuItemID
GetSubMenu
GetMenuState
GetTabbedTextExtentA
ModifyMenuA
GetMessageA
IsChild
GetFocus
DispatchMessageA
DrawFrameControl
GetMessagePos
ClientToScreen
InvertRect
SetCapture
GetClipCursor
EnableWindow
IsWindow
SendMessageA
MessageBeep
CopyRect
GetCapture
DefWindowProcA
GetClassInfoA
ClipCursor
ReleaseCapture
DrawFocusRect
GetWindowLongA
UpdateWindow
SetWindowPos
GetDC
SetRect
ReleaseDC
GetParent
GetActiveWindow
IsIconic
GetLastActivePopup
SetForegroundWindow
RegisterWindowMessageA
SetCursorPos
DrawIcon
SetWindowRgn
RegisterClipboardFormatA
BringWindowToTop
PostMessageA
GetDesktopWindow
PostThreadMessageA
UnregisterClassA
GetSysColorBrush
SetPropA
DestroyIcon
SetMenuItemInfoA
IsWindowVisible
GetSystemMetrics
SystemParametersInfoA
GetMenuItemCount
AppendMenuA
GetMenuItemInfoA
GetSysColor
MapVirtualKeyA
OffsetRect
DrawStateA
InflateRect
DrawEdge
CreateMenu
CopyAcceleratorTableA
LoadBitmapA
GetKeyNameTextA
FillRect
LoadCursorA
GetCursorPos
TabbedTextOutA
RedrawWindow
InvalidateRect
UnionRect
DrawTextExA
PtInRect
GrayStringA
GetClientRect
DrawTextA
KillTimer
GetWindowRect
ScreenToClient
SetTimer
SetCursor
GetTopWindow
gdi32
SelectClipRgn
CreateRectRgn
GetViewportExtEx
GetWindowExtEx
GetPixel
StartDocA
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
CreatePatternBrush
SelectPalette
GetCharWidthA
SetRectRgn
GetViewportOrgEx
StartPage
EndPage
SetAbortProc
AbortDoc
EndDoc
CreateEllipticRgn
LPtoDP
EnumFontFamiliesExA
GetNearestColor
GetPolyFillMode
GetROP2
GetStretchBltMode
GetTextColor
GetTextAlign
GetTextFaceA
GetTextExtentPointA
GetWindowOrgEx
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
CreateFontA
PtVisible
Escape
RectVisible
ExtTextOutA
TextOutA
BitBlt
PatBlt
CreateFontIndirectA
CreateBitmap
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
Ellipse
GetObjectA
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
SetTextColor
GetClipBox
CreateDCA
StretchBlt
GetBkColor
Pie
CreatePen
CreateRectRgnIndirect
CombineRgn
GetBkMode
DeleteDC
SetBkColor
DPtoLP
SetMapMode
CreateSolidBrush
GetDeviceCaps
GetCurrentObject
Rectangle
GetTextMetricsA
GetStockObject
CreatePalette
RealizePalette
StretchDIBits
SetDIBitsToDevice
DeleteObject
GetTextExtentPoint32A
Polygon
ExcludeClipRect
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
GetJobA
ClosePrinter
advapi32
RegDeleteValueA
FreeSid
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
AllocateAndInitializeSid
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CheckTokenMembership
shell32
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
ShellExecuteExA
SHGetDesktopFolder
DragQueryFileA
DragFinish
comctl32
ImageList_GetIconSize
ImageList_DrawEx
shlwapi
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathRemoveFileSpecW
PathFindFileNameA
ole32
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
IsAccelerator
OleTranslateAccelerator
CoInitializeEx
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysFreeString
VarBstrFromDate
SystemTimeToVariantTime
VariantTimeToSystemTime
Sections
.text Size: 447KB - Virtual size: 446KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ