Static task
static1
Behavioral task
behavioral1
Sample
18eef43b4017e70952eea41378f7756f4cc288bdc644e14d072357156d9bca69.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
18eef43b4017e70952eea41378f7756f4cc288bdc644e14d072357156d9bca69.exe
Resource
win10v2004-20240802-en
General
-
Target
18eef43b4017e70952eea41378f7756f4cc288bdc644e14d072357156d9bca69
-
Size
286KB
-
MD5
c5b63656e8818ca1f45af580d6886e08
-
SHA1
26abb2ca0f653ab72fb57ea3be08d9a7d79eb624
-
SHA256
18eef43b4017e70952eea41378f7756f4cc288bdc644e14d072357156d9bca69
-
SHA512
e34c9fdc0af2dd876458f5c4ef881fa9780c8e5f0453d31d700adf4db26e2e4979c81a7c49e1befb9076dafb4323829fae95a07ea76e8220a2b90b8b99c2e321
-
SSDEEP
3072:INeRm3gq6LgY5bOe2SVcV4vPnwH432xjotqu+071z7NlB0/3yWlFtJMpGbxtXW6n:3EHWC433tqa71zBj0fyWlFt1tK6s93
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18eef43b4017e70952eea41378f7756f4cc288bdc644e14d072357156d9bca69
Files
-
18eef43b4017e70952eea41378f7756f4cc288bdc644e14d072357156d9bca69.exe windows:6 windows x64 arch:x64
142599c8b88b85757e5ee4b4abbb36b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
AdjustWindowRectEx
AppendMenuA
BeginPaint
CheckDlgButton
CheckMenuItem
CloseClipboard
CreateMenu
CreateWindowExA
DefDlgProcA
DefWindowProcA
DestroyMenu
DestroyWindow
DispatchMessageA
DrawMenuBar
EmptyClipboard
EnableMenuItem
EnableWindow
EndPaint
GetClientRect
GetDC
GetDlgItemTextA
GetKeyboardState
GetMenu
GetMenuItemCount
GetMenuItemRect
GetMessageA
GetSysColor
GetWindowLongPtrA
GetWindowRect
IntersectRect
InvalidateRect
IsDialogMessageA
IsDlgButtonChecked
KillTimer
LoadCursorA
LoadIconA
MessageBeep
MessageBoxA
OffsetRect
OpenClipboard
PostQuitMessage
RegisterClassA
ReleaseCapture
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetCapture
SetClipboardData
SetForegroundWindow
SetMenu
SetRect
SetTimer
SetWindowLongPtrA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TranslateMessage
UnionRect
WinHelpA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontA
CreateFontIndirectA
CreateHatchBrush
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
Ellipse
EndDoc
EndPage
ExtTextOutW
GetDeviceCaps
GetStockObject
GetTextExtentPoint32A
GetTextExtentPoint32W
GetTextMetricsA
IntersectClipRect
Polygon
Polyline
Rectangle
SelectClipRgn
SelectObject
SetBkMode
SetMapMode
SetPixel
SetTextColor
StartDocA
StartPage
comdlg32
GetOpenFileNameA
GetSaveFileNameA
PrintDlgA
comctl32
ord17
kernel32
CloseHandle
CompareStringW
CreateFileW
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileExA
FindNextFileA
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemTimeAsFileTime
GetTickCount
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LocalFree
MulDiv
MultiByteToWideChar
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
SetEndOfFile
SetEnvironmentVariableA
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleW
WriteFile
Sections
.00cfg Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 186KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.xdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ