Static task
static1
Behavioral task
behavioral1
Sample
80fd2dee7ed101a998af68a760aa6cc059b8c03590b709ea58be44974e0251f4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
80fd2dee7ed101a998af68a760aa6cc059b8c03590b709ea58be44974e0251f4.exe
Resource
win10v2004-20240611-en
General
-
Target
80fd2dee7ed101a998af68a760aa6cc059b8c03590b709ea58be44974e0251f4
-
Size
2.6MB
-
MD5
3f571908898b48f89c87f1692fdaa364
-
SHA1
29c1b0c2eeda91b17d2ef6ac37d4cf3bdf51fc30
-
SHA256
80fd2dee7ed101a998af68a760aa6cc059b8c03590b709ea58be44974e0251f4
-
SHA512
437412320fd65308db79bd05eebbacfd9f31c43b5597adeb20a5ebbb44816e855e5d936ddfe77fd70f07fe174c39f18e798fefd6285bee4906105eb71e289f01
-
SSDEEP
49152:f4j1NmXskEityR+ggV/aLigl8EjIyBaPAkETdFhAitbVRc2Ecr7N+:f4j12xJtyqa+w1ZBhAi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 80fd2dee7ed101a998af68a760aa6cc059b8c03590b709ea58be44974e0251f4
Files
-
80fd2dee7ed101a998af68a760aa6cc059b8c03590b709ea58be44974e0251f4.exe windows:5 windows x86 arch:x86
2c71d0af30c94c6c8ae191b7c608053f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
SetFilePointer
RemoveDirectoryW
MoveFileExW
SetFileAttributesW
GetDiskFreeSpaceExW
ReadFile
lstrlenA
GetPrivateProfileStringW
GetComputerNameW
GetSystemTime
ResetEvent
GetSystemInfo
GetWindowsDirectoryW
GetSystemDirectoryW
GetNativeSystemInfo
PostQueuedCompletionStatus
GetExitCodeThread
CreateIoCompletionPort
GetQueuedCompletionStatus
GetThreadLocale
SetThreadLocale
TerminateProcess
DeviceIoControl
lstrcmpA
GetFileAttributesExW
LocalFree
FileTimeToSystemTime
SleepEx
FormatMessageA
GetFileType
GetStdHandle
PeekNamedPipe
ExpandEnvironmentStringsA
QueryPerformanceCounter
LoadLibraryA
GlobalMemoryStatus
FlushConsoleInputBuffer
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
GetCurrentDirectoryW
FlushFileBuffers
GetTimeZoneInformation
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileTime
SetEvent
GetConsoleCP
ReadConsoleW
GetACP
SetConsoleMode
ReadConsoleInputA
GetConsoleMode
SetConsoleCtrlHandler
ExitProcess
SetFilePointerEx
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
GetModuleHandleExW
ExitThread
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
VirtualProtect
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
IsDebuggerPresent
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStringTypeW
GetCurrentThread
GetCurrentProcess
DuplicateHandle
TryEnterCriticalSection
TerminateThread
InitializeCriticalSection
WriteFile
GetVersion
GlobalFree
GlobalAlloc
MulDiv
GetModuleHandleA
VerifyVersionInfoW
VerSetConditionMask
WideCharToMultiByte
GetVersionExW
GetCurrentProcessId
GetLogicalDriveStringsW
GetLongPathNameW
QueryDosDeviceW
lstrlenW
GetFullPathNameW
LoadLibraryExW
lstrcmpiW
GetModuleHandleW
Process32FirstW
Process32NextW
ProcessIdToSessionId
MultiByteToWideChar
CreateToolhelp32Snapshot
OpenProcess
ReleaseMutex
CreateMutexW
GetPrivateProfileIntW
SystemTimeToFileTime
WaitForSingleObjectEx
GetTimeFormatW
CreateEventW
WaitForSingleObject
WaitForMultipleObjects
InterlockedCompareExchange
InterlockedExchange
CopyFileW
GetFileSize
CreateThread
CloseHandle
DeleteFileW
OutputDebugStringW
Sleep
GetCurrentThreadId
CreateFileW
FindClose
FindNextFileW
SetLastError
FindFirstFileW
CreateDirectoryW
InterlockedIncrement
FreeLibrary
GetProcessHeap
DeleteCriticalSection
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
FindResourceW
LoadResource
FindResourceExW
LoadLibraryW
RaiseException
HeapReAlloc
LockResource
GetLastError
SizeofResource
HeapSize
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
InterlockedDecrement
GetTickCount
EnterCriticalSection
HeapFree
GetDateFormatW
user32
IsWindow
UnregisterClassW
FindWindowExW
ShowWindow
IsRectEmpty
GetIconInfo
DrawIconEx
SystemParametersInfoW
BeginPaint
EndPaint
IsIconic
InvalidateRect
TrackMouseEvent
GetClassInfoExW
SetWindowLongW
LoadCursorW
RegisterClassExW
SendMessageW
CreateWindowExW
DestroyWindow
CallWindowProcW
DefWindowProcW
GetWindowLongW
GetParent
GetDlgItem
GetClientRect
MoveWindow
MapWindowPoints
GetMonitorInfoW
MonitorFromWindow
SetFocus
GetWindowRect
GetWindow
KillTimer
SetTimer
TranslateMessage
CharNextW
PeekMessageW
DispatchMessageW
GetMessageW
GetAncestor
EnumDisplaySettingsW
GetDesktopWindow
GetForegroundWindow
GetWindowInfo
WindowFromPoint
GetShellWindow
MonitorFromPoint
GetWindowThreadProcessId
GetCursorPos
PtInRect
CopyRect
SetRectEmpty
EqualRect
SetCursor
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
CharLowerBuffW
SetCapture
ReleaseCapture
SetWindowRgn
EnableWindow
GetWindowTextW
PostQuitMessage
IsWindowVisible
IsZoomed
MonitorFromRect
OffsetRect
SetLayeredWindowAttributes
UpdateLayeredWindow
SetWindowTextW
GetWindowTextLengthW
GetFocus
DrawTextW
FillRect
UpdateWindow
GetKeyState
SetActiveWindow
ClientToScreen
AttachThreadInput
BringWindowToTop
GetCaretBlinkTime
CreateCaret
SetCaretPos
GetSysColor
SetForegroundWindow
SetWindowPos
RegisterClipboardFormatW
IsClipboardFormatAvailable
wsprintfW
ReleaseDC
GetDC
PostMessageW
IntersectRect
GetDoubleClickTime
ScreenToClient
gdi32
RestoreDC
ExtSelectClipRgn
CreateRectRgnIndirect
SaveDC
SetTextCharacterExtra
GetCurrentObject
GetTextColor
CreateFontIndirectW
Rectangle
CreatePen
CreateSolidBrush
SetBkMode
SetBkColor
SetTextColor
CreateRectRgn
GetViewportOrgEx
CreateRoundRectRgn
SetBitmapBits
GetBitmapBits
StretchBlt
SetStretchBltMode
DeleteDC
BitBlt
SetPixel
SelectObject
CreateCompatibleDC
GetObjectW
DeleteObject
CreateDIBSection
GetStockObject
GetDeviceCaps
CombineRgn
advapi32
LookupAccountNameW
DuplicateTokenEx
OpenServiceW
ReportEventA
RegisterEventSourceA
DeregisterEventSource
ConvertSidToStringSidW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExW
LookupPrivilegeValueW
RegCloseKey
RegQueryInfoKeyW
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
OpenProcessToken
StartServiceW
RegOpenKeyExW
CreateProcessAsUserW
RegDeleteValueW
GetTokenInformation
shell32
SHGetSpecialFolderPathW
SHChangeNotify
ord165
SHCreateDirectoryExW
ShellExecuteW
SHGetSpecialFolderPathA
ole32
RegisterDragDrop
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CreateStreamOnHGlobal
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoTaskMemFree
oleaut32
VarDateFromStr
SystemTimeToVariantTime
SysStringByteLen
VarBstrCmp
SysAllocStringLen
VarUI4FromStr
SysAllocStringByteLen
SysAllocString
LoadRegTypeLi
VariantClear
VariantTimeToSystemTime
LoadTypeLi
SysStringLen
SysFreeString
shlwapi
PathRemoveFileSpecW
PathAppendW
PathIsDirectoryW
PathCombineW
StrStrIW
PathFindFileNameW
PathIsRootW
SHDeleteValueW
SHSetValueW
SHDeleteKeyW
SHGetValueW
AssocQueryStringW
PathSearchAndQualifyW
PathFileExistsW
StrCmpIW
comctl32
ord17
InitCommonControlsEx
msimg32
AlphaBlend
wininet
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
InternetConnectW
InternetSetOptionW
InternetOpenW
InternetCrackUrlW
HttpQueryInfoW
InternetReadFile
setupapi
SetupIterateCabinetW
gdiplus
GdiplusStartup
GdipFree
GdipAlloc
GdipDisposeImage
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipSetInterpolationMode
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDrawString
GdipSetTextRenderingHint
GdipCreateFromHDC
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDrawImageRectI
psapi
GetModuleFileNameExW
GetProcessImageFileNameW
riched20
ord4
crypt32
CryptStringToBinaryW
CryptBinaryToStringW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
wintrust
CryptCATCatalogInfoFromContext
WinVerifyTrust
CryptCATAdminReleaseCatalogContext
CryptCATAdminReleaseContext
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminAcquireContext
CryptCATAdminEnumCatalogFromHash
ws2_32
send
recv
WSASetLastError
closesocket
__WSAFDIsSet
WSAGetLastError
WSACleanup
WSAStartup
connect
getpeername
getsockname
getsockopt
htons
setsockopt
socket
WSAIoctl
getaddrinfo
freeaddrinfo
accept
ioctlsocket
sendto
recvfrom
select
listen
getservbyname
gethostbyname
htonl
shutdown
ntohs
gethostname
bind
wldap32
ord145
ord14
ord216
ord208
ord41
ord118
ord26
ord27
ord127
ord167
ord142
ord79
ord133
ord147
ord301
ord46
wtsapi32
WTSFreeMemory
WTSEnumerateSessionsW
WTSQueryUserToken
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
netapi32
Netbios
iphlpapi
GetAdaptersInfo
GetIpAddrTable
secur32
GetUserNameExW
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 493KB - Virtual size: 492KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ