Static task
static1
Behavioral task
behavioral1
Sample
21719ce49caa2c7ecc932502c7ff8fd1a8758b770e309607cc8114e90ee6b4dc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
21719ce49caa2c7ecc932502c7ff8fd1a8758b770e309607cc8114e90ee6b4dc.exe
Resource
win10v2004-20240730-en
General
-
Target
21719ce49caa2c7ecc932502c7ff8fd1a8758b770e309607cc8114e90ee6b4dc.exe
-
Size
10.2MB
-
MD5
ee8885ea6f54389428ba3005d954cff9
-
SHA1
42e9666afbd7e261668cf792610225b9bede6e7d
-
SHA256
21719ce49caa2c7ecc932502c7ff8fd1a8758b770e309607cc8114e90ee6b4dc
-
SHA512
4e62e239137d476c99684ba8f0adf0ef035257fb4cebf1232db55d0977a9e86de31b2ffc6630c6f0221a939427c0d0bdaafaea9dce4369b062cf2e2c4212ce33
-
SSDEEP
6144:YpCWGX2QsB00PAGhR3XCZTQZnXexeYRujfKI/4a4EOy62Q/h5UF:YEWGX2QsB00PAGyeIexZUn38
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21719ce49caa2c7ecc932502c7ff8fd1a8758b770e309607cc8114e90ee6b4dc.exe
Files
-
21719ce49caa2c7ecc932502c7ff8fd1a8758b770e309607cc8114e90ee6b4dc.exe.exe windows:6 windows x64 arch:x64
fcb89c3a49fcced19a01d3f91adfa2b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
dbghelp
StackWalk64
SymInitialize
SymGetModuleBase64
MiniDumpWriteDump
SymCleanup
SymGetModuleInfo64
SymFunctionTableAccess64
crypt32
CryptBinaryToStringW
wininet
InternetReadFile
InternetQueryDataAvailable
HttpSendRequestW
InternetCrackUrlW
InternetConnectW
InternetOpenW
InternetCheckConnectionW
InternetAttemptConnect
InternetCloseHandle
HttpOpenRequestW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
shlwapi
PathFileExistsW
kernel32
GetPrivateProfileStringW
GetTempPathW
GetPrivateProfileIntW
GetCurrentDirectoryA
GetPrivateProfileStringA
GetTickCount
Sleep
GetUserPreferredUILanguages
GetModuleHandleW
GetProcAddress
GetModuleHandleA
FindFirstFileW
CompareFileTime
FindNextFileW
FindClose
GetSystemDirectoryA
LoadLibraryA
OpenProcess
CreateEventW
WaitForMultipleObjects
CreateFileW
ReadFile
OutputDebugStringA
GetFileSize
CloseHandle
OpenThread
SetEvent
GetSystemDirectoryW
CreateProcessW
WaitForSingleObject
SetCurrentDirectoryW
CopyFileW
GetStartupInfoW
TlsFree
GetCurrentDirectoryW
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
GetConsoleMode
GetConsoleCP
GetModuleFileNameW
WriteFile
GetStdHandle
GetProcessHeap
GetStringTypeW
GetCPInfo
GetOEMCP
IsValidCodePage
GetCurrentThreadId
SetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetACP
HeapSize
GetModuleHandleExW
ExitProcess
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
GetCommandLineW
IsProcessorFeaturePresent
IsDebuggerPresent
MultiByteToWideChar
GetLastError
ReadConsoleW
WideCharToMultiByte
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryExW
HeapReAlloc
LCMapStringW
SetFilePointerEx
OutputDebugStringW
SetStdHandle
WriteConsoleW
FlushFileBuffers
SetEndOfFile
TlsSetValue
HeapAlloc
CreateDirectoryW
HeapFree
DecodePointer
EncodePointer
LoadLibraryExA
FreeLibrary
VirtualAlloc
user32
SetPropW
SetFocus
wsprintfW
DispatchMessageW
TranslateMessage
GetMessageW
LoadIconW
AdjustWindowRectEx
GetMonitorInfoW
MonitorFromWindow
FillRect
GetSysColor
SetPropA
DestroyWindow
GetWindowTextW
CreateWindowExW
SetWindowTextW
ShowWindow
SetWindowLongPtrW
CreateWindowExA
LoadImageA
EndPaint
BeginPaint
GetPropA
ReleaseDC
DrawTextW
GetClientRect
GetDC
GetFocus
GetWindowTextLengthW
CallWindowProcW
IsWindowVisible
GetWindow
GetKeyState
GetParent
IsWindow
GetPropW
InvalidateRect
SendMessageW
gdi32
GetDeviceCaps
LineTo
MoveToEx
DeleteDC
BitBlt
CreateCompatibleDC
GetObjectW
SetDCBrushColor
SetDCPenColor
CreateFontW
GetStockObject
SelectObject
SetBkMode
SetTextColor
SetBkColor
advapi32
RegCreateKeyA
RegOpenKeyA
RegDeleteValueW
RegSetValueExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
RegCloseKey
shell32
ShellExecuteA
SHGetFolderPathW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9.9MB - Virtual size: 9.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ