Static task
static1
Behavioral task
behavioral1
Sample
zqlED47skLNS.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
zqlED47skLNS.exe
Resource
win10v2004-20240730-en
General
-
Target
zqlED47skLNS.exe
-
Size
2.4MB
-
MD5
fa259fb6599009b666c6905a64860d93
-
SHA1
8d99997d10964f9fecc93da0ed23dfc1859c9a5f
-
SHA256
2ba6d1c5189742905efe0530e540fbe7048bf1e6cfb2623f2afe0d1ab93fa8d9
-
SHA512
2e02095bf84260d7534de62eaaa65ddffddec06632b7562e560f2db0a3d34ea6c4f2c20317bf5f487082b41ed94833018281e61dcd156a1b4c9dbf6418c0971c
-
SSDEEP
49152:R2tkHW/SQBbrANVlGHDwmh/qeY7b0/CN7:R2CWSKIrd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource zqlED47skLNS.exe
Files
-
zqlED47skLNS.exe.exe windows:6 windows x64 arch:x64
9c3299c4749f6502f5710b6ab30b716d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
d3d11
D3D11CreateDevice
shlwapi
PathCanonicalizeA
PathCanonicalizeW
kernel32
QueryDosDeviceA
ProcessIdToSessionId
OpenProcess
IsWow64Process
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
GetFileAttributesW
TerminateProcess
GetExitCodeProcess
GetSystemDirectoryW
GetCurrentDirectoryA
GetTempPathW
GetSystemDirectoryA
GetSystemWow64DirectoryA
GetCommandLineW
SetCurrentDirectoryW
GetCurrentProcess
CreateFileA
CreateFileW
LocalFree
K32EnumDeviceDrivers
K32GetDeviceDriverBaseNameA
K32GetDeviceDriverFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetVolumeInformationW
AllocConsole
FreeConsole
GlobalUnlock
GlobalLock
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapReAlloc
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetFileType
GetFileAttributesExW
HeapAlloc
HeapFree
WriteFile
GetStdHandle
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
MoveFileExW
ReadFile
GetSystemDEPPolicy
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetStringTypeW
GetModuleFileNameA
GetCurrentDirectoryW
CreateProcessW
ExitProcess
DeleteCriticalSection
InitializeCriticalSection
CreateEventExA
WaitForSingleObject
CloseHandle
GetLogicalDriveStringsA
LoadLibraryA
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
GetDriveTypeA
FindFirstFileA
FindClose
Sleep
CreateDirectoryW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
DeviceIoControl
GetLastError
SetFileAttributesW
RemoveDirectoryW
DeleteFileW
GetConsoleOutputCP
GetFileSizeEx
WriteConsoleW
SetEndOfFile
GetSystemTimeAsFileTime
LCMapStringEx
HeapSize
SetStdHandle
GetProcessHeap
FindFirstFileExW
LoadLibraryExW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
DecodePointer
EncodePointer
InitializeCriticalSectionEx
GetCurrentThreadId
QueryPerformanceCounter
QueryPerformanceFrequency
FindNextFileW
user32
GetMessageA
TranslateMessage
MessageBoxA
DefWindowProcA
PostQuitMessage
RegisterClassExW
CreateWindowExA
CreateWindowExW
ExitWindowsEx
SendMessageA
DispatchMessageA
GetWindowThreadProcessId
DestroyWindow
GetKeyNameTextA
GetClipboardData
CloseClipboard
OpenClipboard
GetRawInputData
ScreenToClient
MapVirtualKeyA
MessageBoxW
GetWindow
GetTopWindow
GetWindowTextA
PeekMessageA
GetMonitorInfoA
ShowWindow
EnumDisplaySettingsA
FindWindowW
ClientToScreen
SetCursorPos
mouse_event
keybd_event
GetActiveWindow
MonitorFromWindow
EnumWindows
SetProcessDPIAware
GetDesktopWindow
ShowCursor
GetWindowRect
ReleaseDC
GetDC
SetForegroundWindow
MoveWindow
ShowWindowAsync
UnregisterClassW
LoadIconA
LoadCursorA
SetWindowLongPtrA
GetWindowLongPtrA
GetClientRect
SetWindowTextA
UpdateWindow
SetTimer
GetDlgItem
SetWindowPos
gdi32
GetStockObject
GetDeviceCaps
comdlg32
GetOpenFileNameW
advapi32
OpenServiceA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegEnumKeyExA
ConvertSidToStringSidA
OpenSCManagerA
ControlService
CloseServiceHandle
ChangeServiceConfigA
LookupPrivilegeValueA
IsValidSid
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
RegQueryValueExW
RegOpenKeyExW
RegQueryInfoKeyA
RegEnumValueA
RegDeleteTreeW
RegCreateKeyW
RegSetValueExW
RegSetValueExA
RegQueryValueExA
shell32
ShellExecuteA
SHGetKnownFolderPath
ShellExecuteW
ole32
CoInitializeSecurity
CoInitializeEx
CoTaskMemFree
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
oleaut32
SysAllocString
SysFreeString
VariantClear
api-ms-win-shcore-scaling-l1-1-1
SetProcessDpiAwareness
ws2_32
WSAGetLastError
socket
select
WSAStartup
ioctlsocket
closesocket
__WSAFDIsSet
getaddrinfo
connect
WSACleanup
send
recv
dxgi
CreateDXGIFactory1
dwmapi
DwmExtendFrameIntoClientArea
setupapi
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ