Static task
static1
Behavioral task
behavioral1
Sample
13e8031b2548359604996e037e462f60N.exe
Resource
win7-20240708-en
General
-
Target
13e8031b2548359604996e037e462f60N.exe
-
Size
1.7MB
-
MD5
13e8031b2548359604996e037e462f60
-
SHA1
08f2c68f5c267a305854164a3fa702b1bf497aa4
-
SHA256
dfd1e043aeed1200a55cef61d198581793e5b9222d58c71e32848f39fb04b437
-
SHA512
81bd4a759dcd71305dd1e41af4e785ef4aaeedd8479b2b12b00199f2b10bbe5bd90f0ae063dbb3fcce507e78ed1d0bb0d5144d10645a099a159e1c3ee18b759f
-
SSDEEP
12288:yVNnHyrO6kYjCcxSLKNxyPZf/Djt3KaFNJFRRioWck3j4A8Ll6TIml/69:yDnHyrO6kVXf/lJjJScih8Qjt69
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13e8031b2548359604996e037e462f60N.exe
Files
-
13e8031b2548359604996e037e462f60N.exe.exe windows:6 windows x64 arch:x64
03284c4f44cc2fc47cd1f5ab9e2226f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shlwapi
SHStrDupW
comdlg32
GetOpenFileNameW
GetSaveFileNameW
advapi32
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptVerifySignatureW
RegCloseKey
RegCreateKeyExW
comctl32
InitCommonControlsEx
wininet
InternetCloseHandle
InternetOpenUrlW
InternetReadFileExW
InternetSetStatusCallbackW
HttpQueryInfoW
InternetOpenW
crypt32
CryptImportPublicKeyInfo
CertFreeCertificateContext
CertCreateCertificateContext
kernel32
GlobalSize
GlobalLock
GlobalUnlock
GlobalFree
GetTempFileNameW
GetTempPathW
Sleep
LoadResource
LockResource
SizeofResource
FindResourceW
FreeLibrary
LoadLibraryW
LoadLibraryExW
LCMapStringW
CompareStringW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
FlushFileBuffers
SetStdHandle
MoveFileExW
GetConsoleCP
SetFilePointerEx
GetProcAddress
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
GlobalReAlloc
RtlVirtualUnwind
RtlCaptureContext
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetStartupInfoW
DeleteCriticalSection
GetFileType
ReadConsoleW
GetConsoleMode
ReadFile
GetStdHandle
GetProcessHeap
HeapSize
GetModuleHandleExW
ExitProcess
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetCurrentThreadId
SetLastError
AreFileApisANSI
IsProcessorFeaturePresent
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
GetCommandLineA
HeapAlloc
HeapFree
DecodePointer
EncodePointer
RtlPcToFileHeader
RtlUnwindEx
RtlLookupFunctionEntry
MultiByteToWideChar
GlobalAlloc
RaiseException
GetFileAttributesW
GetEnvironmentVariableW
MulDiv
UnhandledExceptionFilter
WideCharToMultiByte
GetModuleHandleW
GetModuleFileNameW
GetVersionExW
GetLastError
CloseHandle
WriteFile
DeleteFileW
CreateFileW
HeapReAlloc
OutputDebugStringW
WriteConsoleW
GetFileAttributesExW
SetEndOfFile
SetEnvironmentVariableA
LoadLibraryExA
user32
EndDialog
DialogBoxParamW
CreateDialogParamW
CreateWindowExW
KillTimer
SetTimer
SetMenuDefaultItem
CheckMenuItem
IsClipboardFormatAvailable
EmptyClipboard
RegisterClipboardFormatW
SetClipboardData
GetGUIThreadInfo
CallNextHookEx
GetWindowThreadProcessId
GetClassNameA
GetClipboardOwner
CloseClipboard
OpenClipboard
LoadBitmapW
GetMenuItemInfoW
TrackPopupMenu
ModifyMenuW
GetMenuItemCount
GetMenuItemID
GetSubMenu
DestroyMenu
GetMenuState
GetMenuStringW
LoadMenuW
GetSystemMetrics
IsDialogMessageW
LoadIconW
UnhookWindowsHookEx
SetWindowsHookExW
FindWindowW
GetCursorPos
MessageBeep
MessageBoxA
SetForegroundWindow
UpdateWindow
GetMenuDefaultItem
BringWindowToTop
IsWindow
RegisterClassExW
PostQuitMessage
PostMessageW
DispatchMessageW
TranslateMessage
GetMessageW
RegisterWindowMessageW
GetSysColor
SetCursor
SetFocus
AppendMenuW
GetSystemMenu
EnableWindow
GetFocus
GetDlgCtrlID
DestroyWindow
LoadStringW
GetDesktopWindow
IntersectRect
ScreenToClient
GetWindowRect
SetWindowTextW
IsWindowVisible
SetWindowPos
ShowWindow
MessageBoxW
DestroyIcon
SetWindowLongPtrW
GetWindowLongPtrW
GetWindowLongW
InflateRect
DrawFocusRect
GetClientRect
GetWindowTextW
InvalidateRect
DrawStateW
CallWindowProcW
DefWindowProcW
DrawFrameControl
LoadImageW
DestroyCursor
GetWindow
GetTopWindow
ReleaseDC
GetDC
SendDlgItemMessageW
GetDlgItem
SendMessageW
GetForegroundWindow
IsWindowUnicode
MapVirtualKeyA
SendInput
keybd_event
ToAsciiEx
GetKeyboardState
LoadKeyboardLayoutA
ActivateKeyboardLayout
GetKeyboardLayout
GetMessageExtraInfo
PostMessageA
GetKeyState
GetClipboardData
gdi32
GetObjectW
BitBlt
CreateCompatibleDC
DeleteDC
GetDeviceCaps
SetBkMode
DeleteObject
CreateFontIndirectW
CreateSolidBrush
SetBkColor
ExtTextOutW
GetTextExtentPoint32W
Rectangle
SelectObject
SetTextColor
EnumFontFamiliesExW
GetStockObject
shell32
Shell_NotifyIconW
SetCurrentProcessExplicitAppUserModelID
ShellExecuteW
ole32
PropVariantClear
CoCreateInstance
CoInitialize
imm32
ImmCreateContext
ImmReleaseContext
ImmAssociateContext
ImmSetCompositionStringW
ImmSetOpenStatus
ImmGetContext
Sections
.text Size: 277KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.2MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE