Static task
static1
Behavioral task
behavioral1
Sample
26f776a84ddc41a57c4154778cec89174aa39aff6efdb41c88cdc9faa8a0a094.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
26f776a84ddc41a57c4154778cec89174aa39aff6efdb41c88cdc9faa8a0a094.exe
Resource
win10v2004-20240730-en
General
-
Target
26f776a84ddc41a57c4154778cec89174aa39aff6efdb41c88cdc9faa8a0a094
-
Size
1.5MB
-
MD5
3e41a4c201b0078238e638ad308be732
-
SHA1
73acc90609a5e79ced042372701caf766d032c6e
-
SHA256
26f776a84ddc41a57c4154778cec89174aa39aff6efdb41c88cdc9faa8a0a094
-
SHA512
1712a46510ca25d25bb091d882b884bc3b3033b0737c56edb9e14c1c8236ad555d968d449559d447e60bf5b525d169b10b94cd23dcf690b84f9ee4806380dbed
-
SSDEEP
24576:fXPbd+8Gocj3UkfLnLzi+yXb96yFBVMYvXKoxvGedw:f87D3LzTMbsy3vaoxvGeu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26f776a84ddc41a57c4154778cec89174aa39aff6efdb41c88cdc9faa8a0a094
Files
-
26f776a84ddc41a57c4154778cec89174aa39aff6efdb41c88cdc9faa8a0a094.exe windows:5 windows x86 arch:x86
8cc057c3c7c8c3ecf3ee602cba689bd6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostname
inet_ntoa
getsockname
send
getpeername
WSAIoctl
select
WSAGetLastError
gethostbyname
shutdown
setsockopt
WSACleanup
bind
__WSAFDIsSet
getsockopt
listen
accept
connect
WSAStartup
inet_addr
htonl
htons
ntohs
recv
socket
closesocket
winmm
timeSetEvent
timeGetTime
timeKillEvent
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
userenv
ExpandEnvironmentStringsForUserA
kernel32
Process32First
SetEvent
WriteFile
Sleep
CreateEventA
ReadFile
Process32Next
OpenEventA
WaitForMultipleObjects
CreateToolhelp32Snapshot
OutputDebugStringA
GetVersionExA
GetCurrentProcessId
SetFileAttributesA
ResumeThread
CreateThread
CreateFileA
GetFileSize
CompareFileTime
GetFileTime
SetFilePointer
MoveFileExA
SetEndOfFile
SetErrorMode
SystemTimeToFileTime
SetFileTime
GetFileAttributesA
FlushFileBuffers
CreateDirectoryA
GetLogicalDriveStringsA
GetSystemTime
GetCurrentThread
VirtualFreeEx
ReadProcessMemory
CreateProcessA
TerminateProcess
SetThreadPriority
VirtualAllocEx
SetProcessShutdownParameters
TerminateThread
ResetEvent
FindResourceA
ReleaseMutex
SizeofResource
LockResource
SetLastError
FormatMessageA
GetStdHandle
WriteConsoleA
GlobalDeleteAtom
GlobalGetAtomNameA
GlobalAddAtomA
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
HeapReAlloc
GetCPInfo
InterlockedDecrement
InterlockedIncrement
RtlUnwind
GetCurrentDirectoryA
SetEnvironmentVariableA
GetStartupInfoA
GetCommandLineA
SetStdHandle
ExitProcess
GetModuleHandleW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsAlloc
DuplicateHandle
ReleaseSemaphore
CreateSemaphoreA
TlsSetValue
TlsGetValue
GetLocalTime
GetLocaleInfoA
SetVolumeLabelA
lstrcmpiA
InterlockedExchange
GetDriveTypeA
GetProcessHeap
HeapFree
HeapAlloc
lstrcpynA
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetFileType
FileTimeToSystemTime
GetVolumeInformationA
DosDateTimeToFileTime
GetFullPathNameA
lstrcpyA
AllocConsole
OpenFileMappingA
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
CreateMutexA
CreateFileMappingA
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
CloseHandle
GetPrivateProfileStructA
WritePrivateProfileStringA
GetACP
GetPrivateProfileStringA
GetPrivateProfileIntA
OpenProcess
WritePrivateProfileSectionA
WritePrivateProfileStructA
WinExec
GetLastError
GetComputerNameA
GetVersion
GetSystemInfo
lstrlenA
DeleteFileA
GetTempPathA
FindNextFileA
FindClose
CopyFileA
FindFirstFileA
FreeLibrary
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessTimes
InitializeCriticalSection
GetSystemTimeAsFileTime
GetTickCount
GetCurrentProcess
GlobalFree
GlobalUnlock
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalSize
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetStringTypeA
GetStringTypeW
HeapCreate
VirtualFree
VirtualAlloc
SetHandleCount
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableW
GetLocaleInfoW
CompareStringA
CompareStringW
ExitThread
RaiseException
HeapSize
LoadResource
user32
TrackPopupMenu
GetMenuItemID
GetSubMenu
LoadMenuA
EnableMenuItem
SetMenuDefaultItem
DestroyMenu
EnableWindow
ToAscii
GetKeyState
GetAsyncKeyState
MapVirtualKeyA
VkKeyScanA
IsIconic
DestroyWindow
PostThreadMessageA
SendNotifyMessageA
WaitMessage
PeekMessageA
ChangeClipboardChain
SetClipboardViewer
GetClipboardOwner
ClientToScreen
EnumDesktopWindows
GetClassNameA
OpenDesktopA
FillRect
DrawTextA
GetFocus
AttachThreadInput
WaitForInputIdle
FindWindowExA
WindowFromPoint
IsDlgButtonChecked
EnumWindows
GetIconInfo
GetWindowTextA
SetRect
GetCaretPos
IsWindow
PostMessageA
IsWindowVisible
EndPaint
DrawIconEx
BeginPaint
GetUpdateRect
IntersectRect
DestroyIcon
keybd_event
GetKeyboardState
mouse_event
SetActiveWindow
MessageBeep
FlashWindow
ChangeDisplaySettingsExA
EnumDisplaySettingsA
ScreenToClient
GetWindowRect
SendDlgItemMessageA
SetForegroundWindow
LoadStringA
GetClientRect
SetFocus
InvalidateRect
ReleaseDC
CheckDlgButton
SetDlgItemInt
GetDlgItemInt
GetProcessWindowStation
RegisterWindowMessageA
GetDlgItem
EndDialog
GetCursorPos
SetWindowTextA
GetDlgItemTextA
DialogBoxParamA
SetDlgItemTextA
MoveWindow
ExitWindowsEx
GetDesktopWindow
wsprintfA
FindWindowA
GetWindowThreadProcessId
SystemParametersInfoA
GetForegroundWindow
MessageBoxA
SendMessageA
CloseClipboard
IsClipboardFormatAvailable
RegisterClipboardFormatA
GetClipboardData
EmptyClipboard
OpenClipboard
SetClipboardData
GetMessageA
GetUserObjectInformationA
SetTimer
RegisterClassExA
PostQuitMessage
GetThreadDesktop
KillTimer
LoadIconA
OpenInputDesktop
CloseDesktop
TranslateMessage
SetWindowLongA
GetWindowLongA
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
SetThreadDesktop
DispatchMessageA
GetSystemMetrics
LoadImageA
AdjustWindowRect
LoadCursorA
IsRectEmpty
GetDC
OemToCharA
CharToOemA
gdi32
SetBkColor
SetTextColor
GetBitmapBits
SetDIBColorTable
GdiFlush
CreatePalette
SelectPalette
CreateFontIndirectA
GetObjectA
ExtEscape
GetSystemPaletteEntries
GetRgnBox
GetRegionData
SetRectRgn
PtInRegion
CombineRgn
OffsetRgn
CreateRectRgn
PatBlt
StretchBlt
CreateDCA
SetBkMode
GetClipBox
GetStockObject
CreateSolidBrush
BitBlt
DeleteDC
CreateDIBSection
GetDeviceCaps
GetDIBits
DeleteObject
SelectObject
CreateCompatibleDC
RealizePalette
GetPixel
CreateCompatibleBitmap
advapi32
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
IsValidSecurityDescriptor
GetSecurityDescriptorSacl
IsValidSid
GetSecurityDescriptorOwner
SetKernelObjectSecurity
GetSecurityDescriptorControl
IsValidAcl
GetKernelObjectSecurity
RegCreateKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
RevertToSelf
ImpersonateLoggedOnUser
GetTokenInformation
OpenProcessToken
CreateProcessAsUserA
RegSetValueExA
QueryServiceConfigA
OpenSCManagerA
EnumServicesStatusA
CloseServiceHandle
OpenServiceA
GetUserNameA
LookupAccountSidA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
SHAppBarMessage
ShellExecuteExA
ShellExecuteA
Shell_NotifyIconA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
imm32
ImmGetDefaultIMEWnd
Sections
.text Size: 701KB - Virtual size: 701KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 722KB - Virtual size: 722KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ