Static task
static1
Behavioral task
behavioral1
Sample
61a9e783f4c88e846f30402d5f52c56ea0bf85715265c0a4adf3583cc97e942e.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
61a9e783f4c88e846f30402d5f52c56ea0bf85715265c0a4adf3583cc97e942e.exe
Resource
win10v2004-20240508-en
General
-
Target
61a9e783f4c88e846f30402d5f52c56ea0bf85715265c0a4adf3583cc97e942e
-
Size
7.6MB
-
MD5
f02dc7cb9c496bb0fa35bad5a4298828
-
SHA1
397084c72ba107503a2e3b93c49175e2f875ee1b
-
SHA256
61a9e783f4c88e846f30402d5f52c56ea0bf85715265c0a4adf3583cc97e942e
-
SHA512
7cd83ba1de9abc4ee8d8bd169e3532879dabbd0bc2e6e022a5bee96e664716b765bb3aed289c2685e9aee38b292289cf02e4beaa67f71040f49b24094f7572a1
-
SSDEEP
98304:Ky0auBcX/G+n8HOMQlOm9wcT2chc2g79DMO/eCyMPwhnu24lFjazJG37yiJyHESm:KflBUGK8AF9B2cmJlpeCyMYZuZPaEWKx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61a9e783f4c88e846f30402d5f52c56ea0bf85715265c0a4adf3583cc97e942e
Files
-
61a9e783f4c88e846f30402d5f52c56ea0bf85715265c0a4adf3583cc97e942e.exe windows:5 windows x86 arch:x86
6ae8d59fdabcfe674f8d27f24b5bc664
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAsFileTime
GetTickCount
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
VerSetConditionMask
MulDiv
LoadLibraryW
VerifyVersionInfoW
GlobalLock
GlobalUnlock
GetFileSize
ReadFile
lstrlenW
GetCurrentDirectoryW
CreateFileW
GetACP
ExitProcess
WriteFile
SetFilePointer
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
CreateDirectoryW
GetFileAttributesW
GlobalAlloc
GetLocalTime
lstrcpynW
lstrcpyW
GetModuleHandleA
VirtualQuery
MoveFileW
InitializeCriticalSection
FindClose
TlsAlloc
GetTempPathW
WaitForSingleObject
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateFileA
SetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
MoveFileExW
DeviceIoControl
GetSystemDirectoryA
ReleaseMutex
CreateMutexW
TlsSetValue
GetVersionExW
SetCurrentDirectoryA
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
VirtualProtect
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlUnwind
GetTimeZoneInformation
GetModuleHandleExW
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
ReadConsoleW
SetEndOfFile
WriteConsoleW
GetFileAttributesExW
CreateEventW
SetLastError
QueryPerformanceFrequency
QueryPerformanceCounter
GetStringTypeW
WideCharToMultiByte
FormatMessageW
TryEnterCriticalSection
OutputDebugStringW
IsDebuggerPresent
ConvertFiberToThread
ConvertThreadToFiber
GetSystemTime
GlobalMemoryStatus
CreateFiber
TlsFree
SetErrorMode
DeleteFiber
SwitchToFiber
SetConsoleMode
ReadConsoleA
GetFullPathNameW
ExitThread
PeekNamedPipe
WaitForMultipleObjects
GetEnvironmentVariableA
CompareFileTime
GetSystemDirectoryW
SleepEx
TlsGetValue
LoadLibraryExW
lstrcmpiW
InterlockedIncrement
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
FreeResource
InterlockedDecrement
GetDriveTypeW
FindResourceExW
CreateThread
GetCommandLineW
GetCurrentThreadId
FindResourceW
LoadResource
LockResource
Sleep
GetModuleFileNameW
SizeofResource
GetModuleFileNameA
DeleteCriticalSection
GetModuleHandleW
GetProcessHeap
GetCurrentProcessId
LocalFree
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
CloseHandle
HeapReAlloc
Process32FirstW
Process32NextW
GetLastError
CreateToolhelp32Snapshot
GetLogicalDriveStringsW
HeapSize
OpenProcess
LocalAlloc
InitializeCriticalSectionAndSpinCount
VirtualAlloc
VirtualFree
HeapFree
GetEnvironmentVariableW
QueryDosDeviceW
user32
GetPropW
SetPropW
GetSystemMetrics
EnableWindow
ShowWindow
GetClassInfoExW
RegisterClassExW
RegisterClassW
CallWindowProcW
DefWindowProcW
wsprintfW
SetWindowRgn
LoadCursorW
InflateRect
SetCursor
GetMonitorInfoW
MonitorFromWindow
LoadImageW
GetWindow
GetParent
SetWindowLongW
GetWindowLongW
PtInRect
IsRectEmpty
OffsetRect
UnionRect
IntersectRect
HideCaret
MapWindowPoints
ScreenToClient
GetCursorPos
GetWindowRect
GetClientRect
GetWindowTextW
GetUpdateRect
UpdateLayeredWindow
BeginPaint
KillTimer
SetTimer
ReleaseCapture
SetCapture
GetKeyState
GetFocus
SetFocus
IsZoomed
IsIconic
IsWindowVisible
SetWindowPos
DestroyWindow
IsWindow
CreateWindowExW
PostMessageW
MonitorFromPoint
ReleaseDC
GetDC
ShowCaret
SetCaretPos
GetCaretPos
ClientToScreen
IsWindowEnabled
UpdateWindow
EqualRect
GetProcessWindowStation
GetUserObjectInformationW
GetCursor
MoveWindow
GetWindowRgn
DrawIconEx
DestroyIcon
PrivateExtractIconsW
MapVirtualKeyExW
CharPrevW
DrawTextW
FillRect
SetRect
CreatePopupMenu
DestroyMenu
EnableMenuItem
AppendMenuW
TrackPopupMenu
CreateCaret
EndPaint
GetKeyNameTextW
GetKeyboardLayout
GetCaretBlinkTime
SetForegroundWindow
GetGUIThreadInfo
InvalidateRgn
CreateAcceleratorTableW
DrawTextA
wsprintfA
GetSysColor
GetMessageW
DispatchMessageW
PeekMessageW
CharNextW
TranslateMessage
MessageBoxW
SendMessageW
GetActiveWindow
ActivateKeyboardLayout
GetWindowTextLengthW
PostQuitMessage
InvalidateRect
SetWindowTextW
advapi32
RegEnumKeyExW
AllocateAndInitializeSid
LookupAccountSidW
GetTokenInformation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
SetEntriesInAclW
CryptCreateHash
CryptDestroyHash
CryptSignHashW
CryptEnumProvidersW
CryptGenRandom
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
FreeSid
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
OpenProcessToken
GetUserNameW
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteExW
SHGetFolderPathW
CommandLineToArgvW
SHGetFileInfoW
DragQueryFileW
ShellExecuteW
ole32
CLSIDFromProgID
DoDragDrop
OleDuplicateData
ReleaseStgMedium
CreateStreamOnHGlobal
CLSIDFromString
CoInitialize
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
OleLockRunning
oleaut32
VarUI4FromStr
SysAllocString
VariantInit
SysFreeString
VariantClear
shlwapi
PathCombineW
SHDeleteKeyW
PathRemoveExtensionW
PathRemoveFileSpecW
PathIsDirectoryW
PathFindFileNameW
PathFileExistsW
crypt32
CertFreeCertificateContext
CertGetCertificateContextProperty
CryptMsgClose
CertOpenSystemStoreW
CryptQueryObject
CertGetEnhancedKeyUsage
CertEnumCertificatesInStore
CryptMsgGetParam
CertFindCertificateInStore
CertOpenStore
CertGetNameStringW
CertDuplicateCertificateContext
CertGetIntendedKeyUsage
CertCloseStore
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
EnumProcesses
EnumProcessModules
dbghelp
MiniDumpWriteDump
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
urlmon
ObtainUserAgentString
gdi32
SetBkMode
StretchBlt
ExtSelectClipRgn
SelectClipRgn
LineTo
GetTextExtentPoint32W
GetClipBox
SetStretchBltMode
SetTextColor
GetObjectA
MoveToEx
TextOutW
GdiFlush
CreateCompatibleBitmap
BitBlt
CreatePatternBrush
GetDeviceCaps
GetTextExtentPointA
GetBitmapBits
SetBitmapBits
SetBkColor
GetCharABCWidthsW
CreateSolidBrush
CreateRectRgnIndirect
CreatePenIndirect
CombineRgn
CreateDIBSection
PtInRegion
CreateRectRgn
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
PlayEnhMetaFile
GetEnhMetaFileHeader
CreateEnhMetaFileW
CloseEnhMetaFile
SelectObject
SaveDC
RestoreDC
Rectangle
RemoveFontMemResourceEx
AddFontMemResourceEx
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateDIBitmap
CreateCompatibleDC
comctl32
_TrackMouseEvent
ord17
InitCommonControlsEx
gdiplus
GdiplusShutdown
GdipAlloc
GdipFree
GdipCreatePath
GdipDeletePath
GdipAddPathLine
ord1
GdipCloneBrush
GdipDeleteBrush
GdiplusStartup
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipSetInterpolationMode
GdipCloneImage
GdipDisposeImage
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreateSolidFill
GdipSetTextRenderingHint
GdipTranslateWorldTransform
GdipDrawImageRectI
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipSetSmoothingMode
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipCloneStringFormat
GdipDeleteStringFormat
GdipDrawRectangleI
GdipDrawPath
GdipFillRectangleI
GdipFillPath
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipDrawString
GdipRotateWorldTransform
GdipSetStringFormatTrimming
GdipStringFormatGetGenericTypographic
GdipMeasureString
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
ws2_32
ntohs
getnameinfo
sendto
recvfrom
WSAEventSelect
WSAEnumNetworkEvents
gethostbyname
gethostname
WSAStartup
WSACreateEvent
WSACloseEvent
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAIoctl
WSASetLastError
socket
setsockopt
shutdown
htons
getsockopt
getsockname
getpeername
connect
closesocket
recv
send
WSAGetLastError
bind
wldap32
ord147
ord219
ord46
ord301
ord145
ord133
ord79
ord142
ord167
ord127
ord27
ord26
ord117
ord41
ord208
ord216
ord14
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 563KB - Virtual size: 563KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14.4MB - Virtual size: 14.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ