Static task
static1
Behavioral task
behavioral1
Sample
f825b692c97c622ab2df13e839a753f52f450d60a41b39675171f10f651b65b3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f825b692c97c622ab2df13e839a753f52f450d60a41b39675171f10f651b65b3.exe
Resource
win10v2004-20240802-en
General
-
Target
f825b692c97c622ab2df13e839a753f52f450d60a41b39675171f10f651b65b3
-
Size
12.2MB
-
MD5
237bad80de61af075a5574a0781f2071
-
SHA1
e61996ba4f8d187edf0a1abcfa8386a382597f3c
-
SHA256
f825b692c97c622ab2df13e839a753f52f450d60a41b39675171f10f651b65b3
-
SHA512
bc7e72233ed7e42f9ef8e9405712116c7ac8a5babedbe0909b6042a2208c889a75d24cb84467888ad0dfe46b3c1975b7685a618c5076f7a42d240ba8003adcae
-
SSDEEP
6144:i9kyX4mH6+mALSXhf4+VbPtoOKDmqNjI9:6TmALSvVnq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f825b692c97c622ab2df13e839a753f52f450d60a41b39675171f10f651b65b3
Files
-
f825b692c97c622ab2df13e839a753f52f450d60a41b39675171f10f651b65b3.exe windows:4 windows x86 arch:x86
a2e7b266d80cb389feb60e5d296e48cd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToSystemTime
FileTimeToLocalFileTime
SetErrorMode
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
GetACP
SetStdHandle
GetFileType
GetTimeZoneInformation
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sleep
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileTime
GetProfileStringA
InterlockedExchange
GetFileSize
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
FindFirstFileA
FindClose
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
SizeofResource
GlobalFlags
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
EnterCriticalSection
lstrcpynA
GetLastError
WaitForSingleObject
CloseHandle
GetModuleFileNameA
GlobalAlloc
lstrcmpA
GetCurrentThread
FormatMessageA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
MulDiv
SetLastError
LoadLibraryA
FreeLibrary
GetVersion
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
GlobalLock
VirtualAlloc
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
lstrcatA
lstrlenA
WinExec
lstrcpyA
IsBadWritePtr
user32
GetFocus
DispatchMessageA
PeekMessageA
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
PostMessageA
IsDialogMessageA
SetWindowTextA
ShowWindow
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
PostQuitMessage
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
WindowFromPoint
GetClassNameA
GetSysColorBrush
DestroyMenu
LoadStringA
CharUpperA
IsWindowVisible
WinHelpA
wsprintfA
GetClassInfoA
SetFocus
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowPos
RegisterWindowMessageA
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetNextDlgTabItem
EndDialog
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
MessageBeep
GetDC
ReleaseDC
SetWindowLongA
LoadIconA
MessageBoxA
GrayStringA
DrawTextA
TabbedTextOutA
SetCursor
GetWindowLongA
CopyRect
FrameRect
InflateRect
FillRect
GetSysColor
OffsetRect
DrawFocusRect
SendMessageA
LoadCursorA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
GetActiveWindow
GetParent
GetCapture
SetCapture
GetClientRect
PtInRect
ReleaseCapture
InvalidateRect
LoadImageA
RedrawWindow
AdjustWindowRectEx
ScreenToClient
RegisterClassA
DestroyCursor
EnableWindow
DefDlgProcA
CharNextA
IsWindowUnicode
DrawStateA
GetWindowRect
GetTopWindow
gdi32
GetStockObject
CreateFontIndirectA
GetObjectA
GetClipBox
SetTextColor
SetBkColor
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
Escape
LineTo
GetDeviceCaps
CreatePen
CreateSolidBrush
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteObject
GetTextExtentPoint32A
MoveToEx
CreateDIBitmap
PatBlt
GetTextExtentPointA
CreateFontA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueA
shell32
ShellExecuteA
comctl32
ord17
wininet
InternetSetOptionExA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetOpenA
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenUrlA
Sections
.text Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12.0MB - Virtual size: 12.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ