Static task
static1
Behavioral task
behavioral1
Sample
5b9c9745307efa76bfcdd91c2fa78a308e4da71b4902c204bf3ebc56c7c46edd.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5b9c9745307efa76bfcdd91c2fa78a308e4da71b4902c204bf3ebc56c7c46edd.exe
Resource
win10v2004-20240508-en
General
-
Target
5b9c9745307efa76bfcdd91c2fa78a308e4da71b4902c204bf3ebc56c7c46edd
-
Size
8.5MB
-
MD5
84b4cee3ba3f7fc54e4a816aa851eb68
-
SHA1
37a52f148ffc660d75bb5dcb11c792e9d3f88d85
-
SHA256
5b9c9745307efa76bfcdd91c2fa78a308e4da71b4902c204bf3ebc56c7c46edd
-
SHA512
486ab593f3f6a48e3619779f8a0f609d32953e1c9d546ee79f738475de17386ec657cddcf89b8c1d9a3c841929b9b26cc83cffe0bb234b83fd7f34e30b6f6f14
-
SSDEEP
196608:Ld19fSOG/ccKZ5RuqKRl2xUlZ9atyRC636GoO:JfSRcc6ruqKR4mrPfn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b9c9745307efa76bfcdd91c2fa78a308e4da71b4902c204bf3ebc56c7c46edd
Files
-
5b9c9745307efa76bfcdd91c2fa78a308e4da71b4902c204bf3ebc56c7c46edd.exe windows:5 windows x86 arch:x86
de2c312f73f0658ab68d3305f930e9c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
VerSetConditionMask
MulDiv
LoadLibraryW
VerifyVersionInfoW
GlobalLock
GlobalUnlock
GetFileSize
ReadFile
lstrlenW
GetCurrentDirectoryW
CreateFileW
GetACP
ExitProcess
WriteFile
SetFilePointer
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
CreateDirectoryW
GetFileAttributesW
GlobalAlloc
GetLocalTime
lstrcpynW
lstrcpyW
GetModuleHandleA
VirtualQuery
MoveFileW
InitializeCriticalSection
TlsGetValue
GetEnvironmentVariableW
GetTempPathW
WaitForSingleObject
CreateFileA
SetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
MoveFileExW
DeviceIoControl
GetSystemDirectoryA
ReleaseMutex
CreateMutexW
SetErrorMode
GetVersionExW
TlsFree
SetCurrentDirectoryA
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
VirtualProtect
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlUnwind
GetTimeZoneInformation
GetModuleHandleExW
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
ReadConsoleW
SetEndOfFile
WriteConsoleW
GetFileAttributesExW
CreateFiber
GlobalMemoryStatus
TlsAlloc
CreateEventW
SetLastError
QueryPerformanceFrequency
QueryPerformanceCounter
GetStringTypeW
WideCharToMultiByte
FormatMessageW
TryEnterCriticalSection
OutputDebugStringW
IsDebuggerPresent
ConvertFiberToThread
ConvertThreadToFiber
GetSystemTime
DeleteFiber
SwitchToFiber
GetSystemTimeAsFileTime
SetConsoleMode
ReadConsoleA
GetFullPathNameW
ExitThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
WaitForMultipleObjects
GetEnvironmentVariableA
CompareFileTime
GetSystemDirectoryW
SleepEx
TlsSetValue
LoadLibraryExW
lstrcmpiW
InterlockedIncrement
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
FreeResource
InterlockedDecrement
GetDriveTypeW
FindResourceExW
CreateThread
GetCommandLineW
GetCurrentThreadId
FindResourceW
LoadResource
LockResource
Sleep
GetModuleFileNameW
SizeofResource
GetModuleFileNameA
DeleteCriticalSection
GetModuleHandleW
GetProcessHeap
GetCurrentProcessId
LocalFree
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
CloseHandle
HeapReAlloc
Process32FirstW
Process32NextW
GetLastError
CreateToolhelp32Snapshot
GetLogicalDriveStringsW
HeapSize
OpenProcess
LocalAlloc
InitializeCriticalSectionAndSpinCount
VirtualAlloc
VirtualFree
HeapFree
FindClose
QueryDosDeviceW
user32
GetPropW
SetPropW
GetSystemMetrics
EnableWindow
ShowWindow
GetClassInfoExW
RegisterClassExW
RegisterClassW
CallWindowProcW
DefWindowProcW
wsprintfW
SetWindowRgn
LoadCursorW
InflateRect
SetCursor
GetMonitorInfoW
MonitorFromWindow
LoadImageW
GetWindow
GetParent
SetWindowLongW
GetWindowLongW
PtInRect
IsRectEmpty
OffsetRect
UnionRect
IntersectRect
HideCaret
MapWindowPoints
ScreenToClient
GetCursorPos
GetWindowRect
GetClientRect
DrawTextA
UpdateLayeredWindow
EndPaint
BeginPaint
KillTimer
SetTimer
ReleaseCapture
SetCapture
GetKeyState
GetFocus
SetFocus
IsZoomed
IsIconic
IsWindowVisible
SetWindowPos
DestroyWindow
IsWindow
CreateWindowExW
PostMessageW
MonitorFromPoint
ShowCaret
SetCaretPos
GetCaretPos
ClientToScreen
IsWindowEnabled
UpdateWindow
EqualRect
ReleaseDC
GetDC
GetProcessWindowStation
GetUserObjectInformationW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
MoveWindow
GetCursor
GetWindowRgn
CharPrevW
DrawTextW
FillRect
SetRect
CreatePopupMenu
DestroyMenu
EnableMenuItem
AppendMenuW
TrackPopupMenu
CreateCaret
GetUpdateRect
DrawIconEx
DestroyIcon
PrivateExtractIconsW
MapVirtualKeyExW
GetKeyNameTextW
GetKeyboardLayout
SetForegroundWindow
GetCaretBlinkTime
GetGUIThreadInfo
InvalidateRgn
GetSysColor
GetMessageW
DispatchMessageW
PeekMessageW
CharNextW
TranslateMessage
MessageBoxW
SendMessageW
GetActiveWindow
ActivateKeyboardLayout
CreateAcceleratorTableW
PostQuitMessage
InvalidateRect
wsprintfA
advapi32
RegCreateKeyExW
AllocateAndInitializeSid
LookupAccountSidW
GetTokenInformation
RegQueryValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptCreateHash
CryptDestroyHash
CryptSignHashW
CryptEnumProvidersW
CryptGenRandom
SetEntriesInAclW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
FreeSid
RegEnumKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
OpenProcessToken
GetUserNameW
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteExW
SHGetFolderPathW
CommandLineToArgvW
SHGetFileInfoW
DragQueryFileW
ShellExecuteW
ole32
CLSIDFromProgID
DoDragDrop
OleDuplicateData
ReleaseStgMedium
CreateStreamOnHGlobal
CLSIDFromString
CoInitialize
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
OleLockRunning
oleaut32
VarUI4FromStr
VariantInit
VariantClear
SysFreeString
SysAllocString
shlwapi
PathCombineW
SHDeleteKeyW
PathRemoveExtensionW
PathRemoveFileSpecW
PathIsDirectoryW
PathFileExistsW
PathFindFileNameW
crypt32
CertGetCertificateContextProperty
CryptQueryObject
CertCloseStore
CryptMsgClose
CertGetEnhancedKeyUsage
CertEnumCertificatesInStore
CertFindCertificateInStore
CertGetNameStringW
CertGetIntendedKeyUsage
CertFreeCertificateContext
CryptMsgGetParam
CertOpenSystemStoreW
CertOpenStore
CertDuplicateCertificateContext
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
EnumProcesses
EnumProcessModules
dbghelp
MiniDumpWriteDump
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
urlmon
ObtainUserAgentString
gdi32
SetBkColor
SetBkMode
LineTo
GetTextExtentPoint32W
GetClipBox
GetCharABCWidthsW
StretchBlt
SetStretchBltMode
SetTextColor
GetObjectA
MoveToEx
TextOutW
GdiFlush
CreateCompatibleBitmap
BitBlt
CreatePatternBrush
GetDeviceCaps
GetTextExtentPointA
GetBitmapBits
ExtSelectClipRgn
SetBitmapBits
SelectClipRgn
CreateSolidBrush
CreateRectRgnIndirect
CreatePenIndirect
CombineRgn
CreateDIBSection
PtInRegion
CreateRectRgn
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
PlayEnhMetaFile
GetEnhMetaFileHeader
CreateEnhMetaFileW
CloseEnhMetaFile
SelectObject
SaveDC
RestoreDC
Rectangle
RemoveFontMemResourceEx
AddFontMemResourceEx
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateDIBitmap
CreateCompatibleDC
comctl32
_TrackMouseEvent
ord17
InitCommonControlsEx
gdiplus
GdiplusShutdown
GdipAlloc
GdipFree
GdipCreatePath
GdipDeletePath
GdipAddPathLine
ord1
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipCloneImage
GdipDisposeImage
GdipDrawPath
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipDrawRectangleI
GdiplusStartup
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipDrawImageRectI
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipSetInterpolationMode
GdipGetImageWidth
GdipSetStringFormatTrimming
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipFillRectangleI
GdipFillPath
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipDrawString
GdipMeasureString
GdipStringFormatGetGenericTypographic
GdipSetTextRenderingHint
GdipGetImageHeight
GdipCloneStringFormat
GdipDeleteStringFormat
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
ws2_32
ntohs
getnameinfo
sendto
recvfrom
gethostbyname
gethostname
WSAStartup
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAIoctl
WSASetLastError
socket
setsockopt
shutdown
htons
getsockopt
getsockname
getpeername
connect
closesocket
recv
send
WSAGetLastError
bind
wldap32
ord147
ord219
ord46
ord301
ord145
ord133
ord79
ord142
ord167
ord127
ord27
ord26
ord117
ord41
ord208
ord216
ord14
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 562KB - Virtual size: 561KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14.4MB - Virtual size: 14.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ