?g_nVerbose@@3HA
Static task
static1
Behavioral task
behavioral1
Sample
f6c902d6a3eb03db7224e08c57cf4aa07fe5e14116b44d8ebe9bc1725c6f036e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6c902d6a3eb03db7224e08c57cf4aa07fe5e14116b44d8ebe9bc1725c6f036e.exe
Resource
win10v2004-20240802-en
General
-
Target
f6c902d6a3eb03db7224e08c57cf4aa07fe5e14116b44d8ebe9bc1725c6f036e
-
Size
4.0MB
-
MD5
078ff6a79a1b3659e9ad0a4b09cbddb1
-
SHA1
b1de961bb00bf5e756c328d8e07b7bc22101e898
-
SHA256
f6c902d6a3eb03db7224e08c57cf4aa07fe5e14116b44d8ebe9bc1725c6f036e
-
SHA512
a6f3ecaa0cc64565fea25f8c573ee2298d0705ca8a57402549ba28f96093be83f5504128893abd3ff28ba35e6d76ffb2790657d5da9f91d347633573aedbf47b
-
SSDEEP
98304:b8CB4cnYISftlAHYeQH7zmRenUD2YkTjI+J:b8CBDY1ftsYDbznU/kXz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6c902d6a3eb03db7224e08c57cf4aa07fe5e14116b44d8ebe9bc1725c6f036e
Files
-
f6c902d6a3eb03db7224e08c57cf4aa07fe5e14116b44d8ebe9bc1725c6f036e.exe windows:5 windows x86 arch:x86
d6ec9649152b65851fd9123462a58aeb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsUNCA
PathFindExtensionA
PathAppendA
PathStripToRootA
PathRemoveBackslashA
PathFindFileNameA
PathCombineA
PathFileExistsA
PathIsDirectoryA
PathRemoveFileSpecA
PathAddBackslashA
setupapi
SetupInstallFileA
kernel32
GetFileAttributesExA
GetFileAttributesA
GetFileSizeEx
GetFileTime
GlobalFlags
GetModuleHandleW
InterlockedIncrement
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
SetErrorMode
RtlUnwind
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
FileTimeToLocalFileTime
VirtualAlloc
HeapReAlloc
ExitProcess
SetStdHandle
GetFileType
HeapSize
GetACP
IsValidCodePage
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
HeapCreate
HeapDestroy
VirtualFree
SetHandleCount
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
CompareStringW
SetEnvironmentVariableA
GetProcessHeap
FileTimeToSystemTime
CreateFileA
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetCurrentProcessId
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
LoadLibraryA
lstrcmpW
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
SetLastError
GlobalAlloc
MulDiv
lstrlenA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetEnvironmentVariableA
FindResourceExA
LocalFree
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcpynA
GetLocalTime
CreateMutexA
GetLongPathNameA
Sleep
GetModuleHandleA
GetProcAddress
GetPrivateProfileIntA
RemoveDirectoryA
WritePrivateProfileStringA
SetFileAttributesA
CopyFileA
GetSystemDirectoryA
FindNextFileA
GetShortPathNameA
GetPrivateProfileStringA
CreateDirectoryA
GetTempPathA
GetTempFileNameA
CreateProcessA
WaitForSingleObject
CloseHandle
DeleteFileA
GetLogicalDrives
GetDriveTypeA
FindFirstFileA
FindClose
MultiByteToWideChar
FormatMessageA
GetCurrentProcess
GetVersionExA
GetFileSize
GetLastError
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetModuleFileNameA
CreateFileW
user32
UnregisterClassA
LoadCursorA
GetSysColorBrush
DestroyMenu
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
CharUpperA
PostQuitMessage
GetWindowThreadProcessId
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
PostMessageA
CreateWindowExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
SystemParametersInfoA
LoadBitmapA
SendMessageA
GetClassInfoExA
GetWindowRect
GetWindowPlacement
GetWindowTextA
GetFocus
SetWindowPos
SetFocus
ShowWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetWindow
GetSysColor
EndPaint
EnableWindow
MessageBoxA
DrawIcon
AppendMenuA
GetSystemMenu
IsIconic
GetClientRect
RedrawWindow
SetTimer
KillTimer
LoadIconA
GetSystemMetrics
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongA
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
gdi32
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
GetObjectA
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
SetTextColor
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
SHFileOperationA
oleaut32
VariantClear
VariantChangeType
VariantInit
Exports
Exports
Sections
.text Size: 284KB - Virtual size: 283KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ