Static task
static1
Behavioral task
behavioral1
Sample
89fbbddeb556eb351ad4e3829ad07d36ab35480b41f52d160962b89687423693.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
89fbbddeb556eb351ad4e3829ad07d36ab35480b41f52d160962b89687423693.exe
Resource
win10v2004-20240802-en
General
-
Target
89fbbddeb556eb351ad4e3829ad07d36ab35480b41f52d160962b89687423693
-
Size
1.3MB
-
MD5
a95fc298d137fc2755a091bba2b50748
-
SHA1
ae96c925485e7d9949646935dfb2d791fb3daba0
-
SHA256
89fbbddeb556eb351ad4e3829ad07d36ab35480b41f52d160962b89687423693
-
SHA512
0d049dd38e6c2e206fb6b6b11eb0d1e077aaa86cbea16add96ec0c274342d2804fa252a72573c35ed4519c2b99dc1a3f2fed5057f951eb5ede150f1557de328c
-
SSDEEP
24576:tIXgCWSpRyndSJVDsVu5unzqWvX17Cks7WE9F5pwg8zmdqQjC60jiHkU:8WSjaSJlsQuzqW/17Cks7R9L58UqFJjI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89fbbddeb556eb351ad4e3829ad07d36ab35480b41f52d160962b89687423693
Files
-
89fbbddeb556eb351ad4e3829ad07d36ab35480b41f52d160962b89687423693.exe windows:6 windows x86 arch:x86
6fe2f907eca9dbc413e5e0339b4fd597
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CLSIDFromString
StringFromGUID2
IIDFromString
OleRun
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
shell32
Shell_NotifyIconA
ShellExecuteA
SHGetFolderPathW
wininet
InternetReadFile
InternetTimeToSystemTime
InternetCrackUrlA
InternetTimeFromSystemTime
InternetOpenA
InternetCloseHandle
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetErrorDlg
user32
SetWindowLongA
LoadImageA
GetDesktopWindow
GetWindowLongA
GetCursorPos
MessageBoxW
SetForegroundWindow
wsprintfA
CharNextA
LoadStringA
GetMessageA
GetMessageW
TranslateMessage
DispatchMessageA
DispatchMessageW
PeekMessageA
PostMessageA
DefWindowProcA
PostQuitMessage
RegisterClassA
CreateWindowExA
DestroyWindow
ShowWindow
MsgWaitForMultipleObjectsEx
IsWindowUnicode
GetSystemMetrics
CreatePopupMenu
AppendMenuA
TrackPopupMenu
version
VerQueryValueW
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GetDriveTypeW
VirtualQuery
VirtualProtect
VirtualAlloc
GetSystemInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetFileType
GetSystemTimeAsFileTime
GetModuleHandleW
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringEx
EncodePointer
InitializeCriticalSectionEx
GetStringTypeW
GetConsoleOutputCP
GetConsoleMode
GetFileInformationByHandle
GetStdHandle
GetModuleFileNameW
InitializeSListHead
WriteConsoleW
GetFullPathNameW
CreateDirectoryW
GetCommandLineA
DecodePointer
CloseHandle
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WaitForSingleObject
CreateMutexA
CreateEventA
WaitForMultipleObjects
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryExA
LoadResource
SizeofResource
lstrcmpA
lstrcmpiA
lstrcatA
lstrlenA
FindResourceA
SetDllDirectoryA
SystemTimeToTzSpecificLocalTime
MultiByteToWideChar
WideCharToMultiByte
IsDBCSLeadByte
ResetEvent
CreateThread
lstrcpyA
lstrcpynA
CreateFileA
WriteFile
OpenEventA
Sleep
DeleteFileA
GetTempPathA
GetCurrentProcess
GetVersionExA
LocalFree
ReadFile
FileTimeToSystemTime
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
FormatMessageW
GetEnvironmentVariableA
FindClose
ExitProcess
TerminateProcess
GetSystemDirectoryA
LockResource
LoadLibraryA
LocalAlloc
FormatMessageA
GetCommandLineW
SetLastError
GetNativeSystemInfo
GetModuleHandleExW
SetHandleInformation
CreatePipe
PeekNamedPipe
GetExitCodeProcess
CreateProcessA
SetEndOfFile
SetFilePointerEx
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
GetFileAttributesA
GetModuleHandleExA
LoadLibraryW
SetStdHandle
LoadLibraryExW
OpenMutexA
QueryPerformanceCounter
CreateFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
OutputDebugStringW
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
GetTimeZoneInformation
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetFileSizeEx
ReadConsoleW
GetCurrentDirectoryW
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetEvent
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyA
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
RegQueryValueExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExA
RegQueryInfoKeyW
RegOpenKeyExA
RegNotifyChangeKeyValue
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
oleaut32
VariantChangeType
GetErrorInfo
SysFreeString
VarUI4FromStr
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VariantInit
VariantClear
shlwapi
ord12
gdi32
GetStockObject
crypt32
CryptUnprotectData
CryptProtectData
CryptStringToBinaryA
CryptBinaryToStringA
msi
ord117
ord189
ord31
ord159
ord160
ord91
ord115
ord44
ord204
ord168
ord137
ord141
ord8
ord67
Sections
.text Size: 436KB - Virtual size: 435KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE