Static task
static1
Behavioral task
behavioral1
Sample
099c758154baf68a03a6d2d47477a16a6f3f058b401422d1d4561e94efe24fd3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
099c758154baf68a03a6d2d47477a16a6f3f058b401422d1d4561e94efe24fd3.exe
Resource
win10v2004-20240709-en
General
-
Target
099c758154baf68a03a6d2d47477a16a6f3f058b401422d1d4561e94efe24fd3
-
Size
4.1MB
-
MD5
8d5adcb957dc913a00677339b6bf2e0e
-
SHA1
444e8f7f84ad7056324c068730d5941e0646fd55
-
SHA256
099c758154baf68a03a6d2d47477a16a6f3f058b401422d1d4561e94efe24fd3
-
SHA512
ef8e1fea8d1722478c21adc33bb392681bb8710b77be83d84f7aa79dca08adc9af51c75b8e2be7bdf5306a169ac538909d6e571fb7d22926a78ed6fec8227995
-
SSDEEP
98304:GT1i3HmLJKeuL3/HID2irB0o/+lcHRcpE0AQx7s0Bx/H+rVrzXjdAF:Gpi3HuJK3L3/kVPip/x7TP4rzXjQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 099c758154baf68a03a6d2d47477a16a6f3f058b401422d1d4561e94efe24fd3
Files
-
099c758154baf68a03a6d2d47477a16a6f3f058b401422d1d4561e94efe24fd3.exe windows:5 windows x86 arch:x86
66679516a399317ebcf4551a7d9ae2f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winusb
WinUsb_Initialize
WinUsb_GetDescriptor
WinUsb_Free
kernel32
MapViewOfFile
GetFileInformationByHandle
FileTimeToSystemTime
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFilePointer
AreFileApisANSI
GetSystemTime
GetStdHandle
GetACP
LoadLibraryExA
GetCurrentProcessId
OpenProcess
SetConsoleCtrlHandler
GetFullPathNameA
Beep
GetTickCount
OpenMutexA
ClearCommError
TerminateThread
CreateThread
WaitCommEvent
SetCommMask
WriteFile
GetOverlappedResult
CancelIo
SetEvent
GetCommTimeouts
SetCommTimeouts
SetupComm
GetDefaultCommConfigA
SetCommConfig
GetTimeFormatA
GetDateFormatA
CreateEventA
PurgeComm
GetCommState
SetCommState
EnterCriticalSection
CreateFileMappingA
FindNextFileA
lstrcpyA
GetFileSize
SetThreadUILanguage
GetSystemDirectoryW
GetModuleFileNameW
GetLocalTime
GlobalLock
GlobalUnlock
lstrcmpA
MultiByteToWideChar
GetSystemInfo
GetVersionExA
GetCurrentProcess
GetModuleHandleA
RemoveDirectoryA
CreateDirectoryA
DeleteFileA
CopyFileA
TerminateProcess
WaitForMultipleObjects
InitializeCriticalSection
DeleteCriticalSection
GetFileAttributesA
GetPrivateProfileStringA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetExitCodeThread
CreateJobObjectW
SetInformationJobObject
AssignProcessToJobObject
FindFirstFileA
FindClose
WinExec
EscapeCommFunction
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentDirectoryA
SetCurrentDirectoryA
CreatePipe
SetHandleInformation
UnmapViewOfFile
SetFileAttributesA
WritePrivateProfileStringA
LeaveCriticalSection
GetStartupInfoA
CreateProcessA
lstrlenA
MulDiv
lstrlenW
GlobalSize
SetLastError
FileTimeToLocalFileTime
DeactivateActCtx
LoadLibraryW
ActivateActCtx
InitializeCriticalSectionAndSpinCount
LocalAlloc
lstrcmpiA
MoveFileA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
CompareStringA
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
ReleaseActCtx
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalGetAtomNameA
GetFileAttributesExA
GetFileSizeEx
GetFileTime
SetThreadPriority
ResumeThread
GetCurrentThreadId
GlobalAddAtomA
GlobalFlags
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
FreeResource
FindResourceA
InterlockedExchange
GetLocaleInfoA
GetUserDefaultUILanguage
GetCPInfo
GetOEMCP
GetWindowsDirectoryA
GetNumberFormatA
GetTempFileNameA
GetTempPathA
GetProfileIntA
SearchPathA
VirtualProtect
GetUserDefaultLCID
FindResourceExW
RtlUnwind
RaiseException
HeapFree
HeapAlloc
ExitThread
GetSystemTimeAsFileTime
FindFirstFileExA
EncodePointer
DecodePointer
GetTimeZoneInformation
HeapReAlloc
FindFirstFileExW
FindNextFileW
ExitProcess
GetCommandLineA
HeapSetInformation
VirtualAlloc
VirtualQuery
SetStdHandle
GetFileType
HeapQueryInformation
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStartupInfoW
LCMapStringW
HeapCreate
GetStringTypeW
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetDriveTypeW
CompareStringW
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
GetCurrentDirectoryW
CreateFileW
GetProcessHeap
SetEnvironmentVariableA
InterlockedCompareExchange
FormatMessageA
LocalFree
WaitForSingleObject
PeekNamedPipe
ReadFile
Sleep
GetExitCodeProcess
LoadResource
LockResource
SizeofResource
FindResourceW
CreateFileA
DeviceIoControl
CloseHandle
GlobalAlloc
GlobalFree
WideCharToMultiByte
GetModuleFileNameA
GetPrivateProfileIntA
GetLastError
user32
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
EndDeferWindowPos
BeginDeferWindowPos
SetActiveWindow
GetForegroundWindow
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
IsChild
WinHelpA
LoadIconA
LoadIconW
RegisterWindowMessageA
IsIconic
PostQuitMessage
InflateRect
IntersectRect
GetMenuItemInfoA
DestroyMenu
SystemParametersInfoA
EndDialog
GetNextDlgTabItem
CreateDialogIndirectParamA
SetRectEmpty
EnumDisplayMonitors
SetLayeredWindowAttributes
LoadCursorW
SetCursor
ShowOwnedPopups
DeleteMenu
InvalidateRect
SetTimer
KillTimer
RedrawWindow
GetMenuDefaultItem
CreatePopupMenu
IsRectEmpty
MapVirtualKeyA
SetCapture
GetAsyncKeyState
ReleaseCapture
InvertRect
DrawFocusRect
HideCaret
EnableScrollBar
NotifyWinEvent
MessageBeep
OffsetRect
GetIconInfo
CopyImage
LoadImageA
GetNextDlgGroupItem
DrawIconEx
IsZoomed
SetWindowRgn
SetParent
DestroyAcceleratorTable
WindowFromPoint
SetClassLongA
LoadMenuW
GetSystemMenu
DrawStateA
DrawEdge
DrawFrameControl
CopyAcceleratorTableA
ToAsciiEx
GetKeyboardLayout
GetKeyboardState
LoadAcceleratorsW
CreateAcceleratorTableA
GrayStringA
SetCursorPos
BringWindowToTop
LockWindowUpdate
GetKeyNameTextA
LoadImageW
IsCharLowerA
MapVirtualKeyExA
UnionRect
UpdateLayeredWindow
MonitorFromPoint
IsMenu
TranslateAcceleratorA
InsertMenuItemA
LoadAcceleratorsA
LoadMenuA
SetForegroundWindow
UnpackDDElParam
PostThreadMessageA
WaitMessage
DefFrameProcA
DefMDIChildProcA
DrawMenuBar
TranslateMDISysAccel
MonitorFromWindow
CreateMenu
SetMenuDefaultItem
FrameRect
GetUpdateRect
RegisterClipboardFormatA
CopyIcon
CharUpperBuffA
GetDoubleClickTime
SubtractRect
MapDialogRect
DrawIcon
DestroyCursor
GetWindowRgn
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
CharUpperA
GetMenuState
GetMenuStringA
AppendMenuA
GetMenuItemID
InsertMenuA
GetMenuItemCount
GetSubMenu
RemoveMenu
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
ShowScrollBar
UpdateWindow
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
SetWindowPos
ShowWindow
MoveWindow
SetWindowLongA
IsWindow
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
CheckDlgButton
GetScrollPos
SetScrollPos
SetFocus
GetFocus
RealChildWindowFromPoint
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
DestroyIcon
SetWindowsHookExA
DeferWindowPos
GetScrollInfo
SetScrollInfo
CopyRect
SetWindowPlacement
GetWindowPlacement
DefWindowProcA
CallWindowProcA
GetMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetMonitorInfoA
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
EnableMenuItem
CheckMenuItem
EndPaint
BeginPaint
GetWindowDC
ReuseDDElParam
ScreenToClient
GetDesktopWindow
wsprintfA
MessageBoxA
EmptyClipboard
SetClipboardData
IsClipboardFormatAvailable
OpenClipboard
GetClipboardData
CloseClipboard
GetSystemMetrics
GetWindowTextLengthA
GetWindowTextA
SetRect
UnhookWindowsHookEx
advapi32
AdjustTokenPrivileges
RegQueryValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegEnumValueA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AllocateAndInitializeSid
FreeSid
RegEnumKeyExA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHFileOperationA
SHCreateDirectoryExA
SHGetPathFromIDListW
SHAppBarMessage
DragQueryFileA
DragFinish
ShellExecuteA
SHGetDesktopFolder
SHGetFileInfoA
SHGetSpecialFolderLocation
ole32
DoDragDrop
OleGetClipboard
RegisterDragDrop
CoLockObjectExternal
RevokeDragDrop
OleLockRunning
IsAccelerator
OleTranslateAccelerator
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
CreateStreamOnHGlobal
CoInitializeEx
CoInitialize
CoUninitialize
CoCreateInstance
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
CoCreateGuid
CoTaskMemFree
msimg32
TransparentBlt
AlphaBlend
comctl32
ImageList_GetIconSize
shlwapi
PathFileExistsA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
PathRemoveFileSpecW
UrlUnescapeA
urlmon
URLDownloadToFileA
setupapi
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
SetupDiGetDevicePropertyW
SetupDiGetDevicePropertyKeys
SetupDiGetClassDescriptionA
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
SetupDiGetDeviceRegistryPropertyA
iphlpapi
GetAdaptersInfo
rpcrt4
UuidToStringA
RpcStringFreeA
ws2_32
send
WSAStartup
socket
closesocket
recv
WSAGetLastError
connect
inet_addr
htons
wininet
InternetOpenA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetGetLastResponseInfoA
InternetOpenUrlA
oleacc
LresultFromObject
CreateStdAccessibleObject
AccessibleObjectFromWindow
gdiplus
GdipDrawImageI
GdipFree
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipDrawImageRectI
GdipSetInterpolationMode
GdipCreateFromHDC
GdiplusShutdown
GdiplusStartup
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipAlloc
GdipDeleteGraphics
GdipGetImageGraphicsContext
imm32
ImmGetContext
ImmGetOpenStatus
ImmReleaseContext
winmm
PlaySoundA
gdi32
GetTextFaceA
SetPixelV
MoveToEx
SetTextAlign
SetPaletteEntries
ExtFloodFill
GetBoundsRect
FrameRgn
LineTo
IntersectClipRect
ExcludeClipRect
GetClipBox
GetLayout
SetLayout
SelectClipRgn
CreateRectRgn
GetObjectA
GetViewportExtEx
GetWindowExtEx
BitBlt
SetMapMode
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
CreateBitmap
CreateCompatibleDC
GetStockObject
SelectPalette
GetObjectType
CreatePen
CreateSolidBrush
CreateHatchBrush
LPtoDP
EnumFontFamiliesExA
GetRgnBox
OffsetRgn
Rectangle
SetPixel
StretchBlt
SetDIBColorTable
Polygon
SetTextColor
SetROP2
SetPolyFillMode
SetBkMode
SetBkColor
Ellipse
Polyline
CreateEllipticRgn
GetTextColor
CreatePolygonRgn
CreateRoundRectRgn
CreateDIBSection
GetSystemPaletteEntries
RealizePalette
RestoreDC
SaveDC
DeleteObject
CreateDCA
CopyMetaFileA
GetWindowOrgEx
GetViewportOrgEx
PtInRegion
GetPixel
FillRgn
GetNearestPaletteIndex
GetPaletteEntries
CreatePalette
GetBkColor
GetTextCharsetInfo
EnumFontFamiliesA
GetTextMetricsA
CreateCompatibleBitmap
CreateDIBitmap
GetTextExtentPoint32A
DPtoLP
PatBlt
CombineRgn
SetRectRgn
CreateRectRgnIndirect
CreateFontIndirectA
GetDeviceCaps
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comdlg32
GetFileTitleA
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringLen
VariantChangeType
VariantClear
SysStringLen
SysFreeString
VarBstrFromDate
VariantInit
SysAllocString
Sections
.text Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1015KB - Virtual size: 1014KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 137KB - Virtual size: 9.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ