Static task
static1
Behavioral task
behavioral1
Sample
08570bac1717eda4c6cec898cf9ea99e434391e9d8c21e55419abca7ad6b2898.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
08570bac1717eda4c6cec898cf9ea99e434391e9d8c21e55419abca7ad6b2898.exe
Resource
win10v2004-20240802-en
General
-
Target
08570bac1717eda4c6cec898cf9ea99e434391e9d8c21e55419abca7ad6b2898
-
Size
2.6MB
-
MD5
c2ea7a20cd026a72f9437d462df02e21
-
SHA1
76c8c824ae2fc91a86ce6df875a6829d0fbaeff9
-
SHA256
08570bac1717eda4c6cec898cf9ea99e434391e9d8c21e55419abca7ad6b2898
-
SHA512
08fcdf420d966fb5d75ad2d8d07ca361454fd7347e8261a9a1829ffd409540695b0ea803c735b604ff8f7f4cabbc3a9279b40f71b8fe08f1092cd4bb1113e96e
-
SSDEEP
49152:jLBUrxYBTWAuKnIkt5ipoIsCTisHfuf3SwDGE559CITOQC8ExYdTEqZquu:Bx5FLCCcEkoCnu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08570bac1717eda4c6cec898cf9ea99e434391e9d8c21e55419abca7ad6b2898
Files
-
08570bac1717eda4c6cec898cf9ea99e434391e9d8c21e55419abca7ad6b2898.exe windows:5 windows x64 arch:x64
910ed8c85ea2d5e669971c06079003fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
WSASetLastError
shutdown
send
ioctlsocket
WSAGetLastError
recv
connect
inet_ntoa
htons
inet_addr
htonl
getsockname
setsockopt
sendto
bind
gethostbyname
listen
accept
select
__WSAFDIsSet
getpeername
socket
closesocket
WSAStartup
kernel32
DeleteFileW
FindFirstFileW
GetDriveTypeW
CreateEventW
SetEvent
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
WriteFile
GetFileAttributesW
GlobalSize
ReadFile
GetFileSize
SetFileTime
CreateFileW
MoveFileW
CreateDirectoryW
GetTempPathA
ResetEvent
WaitForSingleObject
TerminateThread
SetThreadPriority
CreateThread
WideCharToMultiByte
GetSystemTimeAsFileTime
GetLocalTime
OutputDebugStringA
CreateFileA
DeviceIoControl
FindFirstFileA
FindNextFileA
DeleteFileA
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemInfo
GetCurrentDirectoryA
GetFullPathNameA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStartupInfoA
GetFileType
SetHandleCount
LoadLibraryA
FindNextFileW
HeapSize
HeapCreate
HeapSetInformation
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
FlsAlloc
FlsFree
FlsSetValue
FlsGetValue
DecodePointer
EncodePointer
GetStdHandle
GetTimeZoneInformation
GetStartupInfoW
RtlCaptureContext
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
VirtualQuery
VirtualProtect
ExitProcess
HeapReAlloc
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
GetProcessHeap
HeapAlloc
HeapFree
InterlockedPushEntrySList
LCMapStringA
LCMapStringW
FlushFileBuffers
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
FindClose
RemoveDirectoryW
OpenProcess
ProcessIdToSessionId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
LoadLibraryW
CreateProcessA
VerSetConditionMask
VerifyVersionInfoW
CreateFileMappingW
GetVersionExW
GetModuleFileNameA
Sleep
GetCommandLineW
CreateMutexW
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
lstrcmpiW
GetModuleHandleW
GetProcAddress
GetLastError
lstrlenW
GetTickCount
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
CloseHandle
GetCurrentProcessId
InitializeCriticalSection
SetLastError
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
GetVersion
GlobalMemoryStatus
FlushConsoleInputBuffer
FreeEnvironmentStringsW
GetEnvironmentStringsW
LocalAlloc
ReadConsoleInputA
SetConsoleMode
SetConsoleCtrlHandler
user32
EnumDisplayMonitors
GetCursorInfo
GetIconInfo
GetPriorityClipboardFormat
GetClipboardSequenceNumber
ExitWindowsEx
GetClipboardData
MapVirtualKeyW
SendInput
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetThreadDesktop
FindWindowW
SetDlgItemTextW
SetDlgItemInt
SendDlgItemMessageW
GetDlgItemTextW
GetDlgItemInt
FillRect
DrawTextA
SetScrollInfo
EnumDisplaySettingsW
ShowScrollBar
SetScrollPos
GetScrollRange
WindowFromPoint
EnableWindow
ClientToScreen
MoveWindow
CreatePopupMenu
AppendMenuW
DialogBoxParamW
GetDlgCtrlID
GetKeyState
LockWorkStation
GetSystemMetrics
GetCursorPos
LoadIconW
GetCapture
PtInRect
SetCursor
ReleaseCapture
OffsetRect
EndPaint
BeginPaint
GetWindowLongPtrW
GetUserObjectInformationW
OpenInputDesktop
IntersectRect
mouse_event
UnionRect
GetScrollInfo
GetWindowThreadProcessId
GetSubMenu
TrackPopupMenu
CallWindowProcW
MonitorFromPoint
DestroyMenu
CheckMenuItem
EnableMenuItem
EnumWindows
UnregisterClassW
RegisterClassW
GetScrollPos
DeleteMenu
LoadMenuW
DrawTextW
SetForegroundWindow
SystemParametersInfoW
ChangeDisplaySettingsW
DrawIconEx
DestroyIcon
LoadImageW
SetWindowLongW
GetParent
GetWindow
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
IsWindow
IsDialogMessageW
SetFocus
SetCapture
KillTimer
SetTimer
IsWindowVisible
ReleaseDC
GetDC
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
SendMessageW
GetWindowLongW
DefWindowProcW
MessageBoxW
CreateWindowExW
RegisterClassExW
CharNextW
PeekMessageW
LoadStringW
LoadCursorW
GetClassInfoExW
OpenDesktopW
SetThreadDesktop
CloseDesktop
GetMessageW
PostQuitMessage
TranslateMessage
DispatchMessageW
CreateDialogParamW
SetWindowLongPtrW
GetDlgItemTextA
EndDialog
DestroyWindow
PostThreadMessageW
GetDlgItem
ShowWindow
InvalidateRect
UpdateWindow
GetClientRect
SetWindowPos
PostMessageW
UnregisterClassA
GetDesktopWindow
GetProcessWindowStation
GetActiveWindow
gdi32
GetPaletteEntries
CreateDCW
StretchBlt
ExtSelectClipRgn
CreateRectRgn
RestoreDC
SaveDC
CreateCompatibleDC
CreateDIBSection
SetStretchBltMode
GetObjectW
GetDIBits
GetDeviceCaps
GetTextExtentExPointW
CreatePen
CreateHatchBrush
CreateFontW
SetBkColor
ExtTextOutW
RoundRect
Polygon
Ellipse
ExcludeClipRect
SelectClipRgn
SetViewportOrgEx
SetTextColor
SetBkMode
GetStockObject
DeleteDC
DeleteObject
SelectObject
BitBlt
CreateSolidBrush
Rectangle
advapi32
RegisterServiceCtrlHandlerW
SetServiceStatus
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
ReportEventW
DeregisterEventSource
RegisterEventSourceW
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserW
DeleteService
CreateServiceW
OpenServiceW
StartServiceW
ControlService
ChangeServiceConfig2W
OpenSCManagerW
CloseServiceHandle
GetUserNameW
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
StartServiceCtrlDispatcherW
shell32
SHGetFolderPathW
DragFinish
Shell_NotifyIconW
DragAcceptFiles
ShellExecuteA
DragQueryFileW
ole32
CoCreateInstance
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VariantClear
VarUI4FromStr
VariantInit
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 643KB - Virtual size: 642KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 101KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ