Static task
static1
Behavioral task
behavioral1
Sample
ddbd4be5550364203e1d34927c7202b6e2346870eec72f0bc126f9753f3e7221.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ddbd4be5550364203e1d34927c7202b6e2346870eec72f0bc126f9753f3e7221.exe
Resource
win10v2004-20240508-en
General
-
Target
ddbd4be5550364203e1d34927c7202b6e2346870eec72f0bc126f9753f3e7221
-
Size
6.8MB
-
MD5
81c42b35756ede2bc29dcc675b2b9738
-
SHA1
c6545b7c26775652a8219856da54874c6c6288b0
-
SHA256
ddbd4be5550364203e1d34927c7202b6e2346870eec72f0bc126f9753f3e7221
-
SHA512
a433a4506b6dd965db03d666d3f69c8efb109ac0856d8880e09bf90817b544654e17dc975cb698bb559b9b50eade23c341676142d681c2b8cdd8a1842e630271
-
SSDEEP
98304:zpNu95AYbWgOpK5HXke0ch0jB912AH0hZuwzSpabz+Nbjuirg4956ZawAe:zpNG5RWgVX6cSPchZmaz+NfuisacN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ddbd4be5550364203e1d34927c7202b6e2346870eec72f0bc126f9753f3e7221
Files
-
ddbd4be5550364203e1d34927c7202b6e2346870eec72f0bc126f9753f3e7221.exe windows:5 windows x86 arch:x86
26b240da03174e161bfcb718fa0ad6bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
VerSetConditionMask
MulDiv
LoadLibraryW
VerifyVersionInfoW
GlobalLock
GlobalUnlock
GetFileSize
ReadFile
lstrlenW
GetCurrentDirectoryW
CreateFileW
GetACP
ExitProcess
WriteFile
SetFilePointer
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
CreateDirectoryW
GetFileAttributesW
GlobalAlloc
GetLocalTime
lstrcpynW
lstrcpyW
GetModuleHandleA
VirtualQuery
MoveFileW
InitializeCriticalSection
TlsGetValue
GetTempPathW
WaitForSingleObject
FindClose
CreateFileA
SetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
MoveFileExW
DeviceIoControl
GetSystemDirectoryA
GetSystemTime
GetNativeSystemInfo
GetSystemDirectoryW
ReleaseMutex
CreateMutexW
SetErrorMode
GetVersionExW
TlsFree
SetCurrentDirectoryA
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
VirtualProtect
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlUnwind
GetTimeZoneInformation
GetModuleHandleExW
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
ReadConsoleW
SetEndOfFile
WriteConsoleW
GetFileAttributesExW
TlsAlloc
CreateEventW
SetLastError
QueryPerformanceFrequency
QueryPerformanceCounter
GetStringTypeW
WideCharToMultiByte
FormatMessageW
TryEnterCriticalSection
OutputDebugStringW
IsDebuggerPresent
GlobalMemoryStatus
ConvertFiberToThread
ConvertThreadToFiber
CreateFiber
DeleteFiber
GetSystemTimeAsFileTime
SwitchToFiber
SetConsoleMode
ReadConsoleA
GetFullPathNameW
ExitThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
WaitForMultipleObjects
GetEnvironmentVariableA
CompareFileTime
SleepEx
TlsSetValue
LoadLibraryExW
lstrcmpiW
InterlockedIncrement
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
FreeResource
InterlockedDecrement
GetDriveTypeW
FindResourceExW
CreateThread
MultiByteToWideChar
GetCommandLineW
GetCurrentThreadId
FindResourceW
LoadResource
LockResource
Sleep
GetModuleFileNameW
SizeofResource
GetModuleFileNameA
DeleteCriticalSection
GetModuleHandleW
GetProcessHeap
GetCurrentProcessId
LocalFree
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
CloseHandle
HeapReAlloc
Process32FirstW
Process32NextW
GetLastError
CreateToolhelp32Snapshot
GetLogicalDriveStringsW
HeapSize
OpenProcess
LocalAlloc
InitializeCriticalSectionAndSpinCount
VirtualAlloc
VirtualFree
HeapFree
GetEnvironmentVariableW
QueryDosDeviceW
user32
GetPropW
SetPropW
GetSystemMetrics
EnableWindow
ShowWindow
GetClassInfoExW
RegisterClassExW
RegisterClassW
CallWindowProcW
DefWindowProcW
wsprintfW
SetWindowRgn
LoadCursorW
InflateRect
SetCursor
GetMonitorInfoW
MonitorFromWindow
LoadImageW
GetWindow
GetParent
SetWindowLongW
GetWindowLongW
PtInRect
IsRectEmpty
OffsetRect
UnionRect
IntersectRect
HideCaret
MapWindowPoints
ScreenToClient
GetCursorPos
GetWindowRect
GetClientRect
GetWindowTextLengthW
GetUpdateRect
UpdateLayeredWindow
BeginPaint
KillTimer
SetTimer
ReleaseCapture
SetCapture
GetKeyState
GetFocus
SetFocus
IsZoomed
IsIconic
IsWindowVisible
SetWindowPos
DestroyWindow
IsWindow
CreateWindowExW
PostMessageW
MonitorFromPoint
ReleaseDC
GetDC
ShowCaret
SetCaretPos
GetCaretPos
ClientToScreen
IsWindowEnabled
UpdateWindow
EqualRect
GetProcessWindowStation
GetUserObjectInformationW
SetWindowTextW
GetCursor
MoveWindow
GetWindowRgn
DrawIconEx
DestroyIcon
PrivateExtractIconsW
CharPrevW
DrawTextW
FillRect
SetRect
CreatePopupMenu
DestroyMenu
EnableMenuItem
AppendMenuW
TrackPopupMenu
CreateCaret
EndPaint
MapVirtualKeyExW
GetKeyNameTextW
GetKeyboardLayout
GetCaretBlinkTime
SetForegroundWindow
GetGUIThreadInfo
InvalidateRgn
CreateAcceleratorTableW
DrawTextA
GetSysColor
GetMessageW
DispatchMessageW
PeekMessageW
CharNextW
TranslateMessage
MessageBoxW
SendMessageW
GetActiveWindow
ActivateKeyboardLayout
wsprintfA
PostQuitMessage
InvalidateRect
GetWindowTextW
advapi32
RegCreateKeyExW
AllocateAndInitializeSid
LookupAccountSidW
GetTokenInformation
RegQueryValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
SetEntriesInAclW
CryptCreateHash
CryptDestroyHash
CryptSignHashW
CryptEnumProvidersW
CryptGenRandom
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
FreeSid
RegEnumKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
OpenProcessToken
GetUserNameW
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteExW
SHGetFolderPathW
CommandLineToArgvW
SHGetFileInfoW
DragQueryFileW
ShellExecuteW
ole32
DoDragDrop
OleDuplicateData
ReleaseStgMedium
CLSIDFromString
CreateStreamOnHGlobal
OleLockRunning
CoInitialize
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CLSIDFromProgID
oleaut32
SysFreeString
SysAllocString
VariantInit
VarUI4FromStr
VariantClear
shlwapi
PathCombineW
SHDeleteKeyW
PathRemoveExtensionW
PathRemoveFileSpecW
PathIsDirectoryW
PathFindFileNameW
PathFileExistsW
crypt32
CertGetCertificateContextProperty
CertFreeCertificateContext
CryptQueryObject
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertEnumCertificatesInStore
CertCloseStore
CertFindCertificateInStore
CertGetNameStringW
CryptMsgClose
CertOpenStore
CertDuplicateCertificateContext
CryptMsgGetParam
CertOpenSystemStoreW
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
EnumProcesses
EnumProcessModules
dbghelp
MiniDumpWriteDump
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
urlmon
ObtainUserAgentString
gdi32
StretchBlt
ExtSelectClipRgn
SelectClipRgn
LineTo
GetTextExtentPoint32W
GetClipBox
SetStretchBltMode
SetTextColor
GetObjectA
SetBkMode
TextOutW
GdiFlush
CreateCompatibleBitmap
BitBlt
CreatePatternBrush
GetTextExtentPointA
GetDeviceCaps
GetBitmapBits
SetBitmapBits
MoveToEx
SetBkColor
GetCharABCWidthsW
CreateSolidBrush
CreateRectRgnIndirect
CreatePenIndirect
CombineRgn
CreateDIBSection
PtInRegion
CreateRectRgn
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
PlayEnhMetaFile
GetEnhMetaFileHeader
CreateEnhMetaFileW
CloseEnhMetaFile
SelectObject
SaveDC
RestoreDC
Rectangle
RemoveFontMemResourceEx
AddFontMemResourceEx
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateDIBitmap
CreateCompatibleDC
comctl32
_TrackMouseEvent
ord17
InitCommonControlsEx
gdiplus
GdiplusStartup
GdiplusShutdown
GdipAlloc
GdipFree
GdipCreatePath
GdipDeletePath
GdipAddPathLine
ord1
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipSetInterpolationMode
GdipCloneImage
GdipDisposeImage
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetTextRenderingHint
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipDrawImageRectI
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipSetSmoothingMode
GdipSetStringFormatTrimming
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipCloneStringFormat
GdipDeleteStringFormat
GdipDrawPath
GdipFillRectangleI
GdipFillPath
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipDeleteFont
GdipDrawString
GdipDrawRectangleI
GdipGetImageWidth
GdipStringFormatGetGenericTypographic
GdipMeasureString
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
ws2_32
htons
getnameinfo
sendto
recvfrom
WSAEventSelect
WSAEnumNetworkEvents
gethostbyname
gethostname
WSAStartup
WSACreateEvent
WSACloseEvent
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
shutdown
getsockopt
getsockname
getpeername
connect
bind
closesocket
recv
send
WSAGetLastError
wldap32
ord147
ord219
ord46
ord301
ord145
ord133
ord79
ord142
ord167
ord127
ord27
ord26
ord117
ord41
ord208
ord216
ord14
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 572KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12.8MB - Virtual size: 12.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ