Static task
static1
Behavioral task
behavioral1
Sample
f5898f336d855448992bc51099c71eae63420a429bb3e59e70d8ab48d653fc19.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f5898f336d855448992bc51099c71eae63420a429bb3e59e70d8ab48d653fc19.exe
Resource
win10v2004-20240709-en
General
-
Target
f5898f336d855448992bc51099c71eae63420a429bb3e59e70d8ab48d653fc19
-
Size
2.8MB
-
MD5
2d80012a4872837d54541cfb3e4e0333
-
SHA1
c2cce8bbcfe03d3ee192c45f3a5ce4b78c1657cc
-
SHA256
f5898f336d855448992bc51099c71eae63420a429bb3e59e70d8ab48d653fc19
-
SHA512
064490ae4022adb15f66c111af831707198669e28a3f16352dad3ee076493b6c16fd8886e856373bfe273682d19911caf9c70cc375a9e472c5c818624a7e9d6a
-
SSDEEP
49152:xwJmIrnpW5MvGN8beZQ/sV076z5cN/MO2UyC1tFTH7qj:MpW5MvGN8qCEy6zSpMO2UyC1tFvqj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5898f336d855448992bc51099c71eae63420a429bb3e59e70d8ab48d653fc19
Files
-
f5898f336d855448992bc51099c71eae63420a429bb3e59e70d8ab48d653fc19.exe windows:4 windows x86 arch:x86
692eea76d45dd5e54f5c867aa715372b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
kernel32
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetThreadLocale
GetVersionExA
GetVersionExW
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedCompareExchange
InterlockedExchange
IsProcessorFeaturePresent
LoadLibraryW
LoadResource
LockResource
lstrlenA
lstrlenW
MultiByteToWideChar
OpenEventW
OpenMutexW
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReadFile
SetEvent
SetFilePointer
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SystemTimeToFileTime
TerminateProcess
GetProcessHeap
UnmapViewOfFile
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteFile
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetCPInfo
InterlockedIncrement
InterlockedDecrement
HeapCreate
GetEnvironmentVariableA
TlsGetValue
TlsAlloc
TlsSetValue
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
GetCurrentProcess
ExitProcess
GetVersion
GetStartupInfoA
GetModuleHandleA
RtlUnwind
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleHandleW
GetModuleFileNameW
GetLocalTime
GetLocaleInfoA
GetLastError
GetFileSize
GetFileInformationByHandle
GetExitCodeThread
GetExitCodeProcess
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetACP
FreeResource
FreeLibrary
FlushInstructionCache
FindResourceW
FindResourceExW
FileTimeToSystemTime
DeleteCriticalSection
CreateMutexW
CreateFileW
CopyFileW
GetStartupInfoW
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
LoadLibraryA
GetCommandLineW
GetConsoleMode
UnhandledExceptionFilter
user32
SystemParametersInfoW
TranslateMessage
UnregisterClassA
UpdateWindow
WindowFromPoint
VkKeyScanW
MessageBoxA
SetFocus
SetCursor
SetClassLongW
SetCapture
SetActiveWindow
SendMessageW
ScreenToClient
ReleaseCapture
RegisterWindowMessageW
RegisterClassExW
PtInRect
PostThreadMessageW
PostMessageW
PeekMessageW
OpenClipboard
OffsetRect
MoveWindow
ShowWindow
LoadImageW
LoadIconW
LoadCursorW
LoadBitmapW
KillTimer
IsWindowVisible
IsWindowEnabled
IsWindow
IsDialogMessageW
IsChild
InvalidateRect
IntersectRect
InflateRect
GetWindowTextW
GetWindowTextLengthW
GetWindowRect
GetWindowLongW
GetSystemMetrics
GetScrollPos
GetParent
GetNextDlgTabItem
GetMessageW
GetKeyState
GetForegroundWindow
GetFocus
GetDlgItem
SetWindowTextW
SetWindowRgn
SetWindowPos
SetWindowLongW
SetTimer
SetRectEmpty
SetRect
MapWindowPoints
SetForegroundWindow
GetDlgCtrlID
GetDesktopWindow
GetCursorPos
GetClipboardData
GetClientRect
GetClassInfoExW
GetActiveWindow
FindWindowW
FindWindowExW
FillRect
EqualRect
EndPaint
EnableWindow
DrawTextW
DrawIconEx
DrawFrameControl
DispatchMessageW
DestroyWindow
DestroyIcon
DestroyCursor
DefWindowProcW
CreateWindowExW
CopyRect
CloseClipboard
ClientToScreen
CallWindowProcW
BringWindowToTop
BeginPaint
GetDC
GetKeyboardType
ReleaseDC
GetWindowThreadProcessId
gdi32
ExtSelectClipRgn
ExtTextOutW
GetClipRgn
GetCurrentObject
GetObjectW
GetStockObject
GetTextColor
GetTextExtentPoint32W
GetViewportOrgEx
LineTo
MoveToEx
OffsetRgn
DeleteObject
RectInRegion
RestoreDC
SaveDC
SelectObject
SetBkColor
SetBkMode
SetStretchBltMode
SetTextColor
SetViewportOrgEx
StretchBlt
TextOutW
DeleteDC
CreateSolidBrush
CreateRoundRectRgn
CreateRectRgnIndirect
CreatePen
Rectangle
GetDeviceCaps
CreateFontIndirectW
comdlg32
GetOpenFileNameW
CommDlgExtendedError
ChooseColorA
advapi32
RegQueryValueExW
RegOpenKeyW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
shell32
ShellExecuteExW
ShellExecuteW
CommandLineToArgvW
shlwapi
PathAddBackslashW
PathFileExistsW
StrToIntA
StrToIntW
Sections
.text Size: 760KB - Virtual size: 757KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.phead1 Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE