Static task
static1
Behavioral task
behavioral1
Sample
82ab1ff424e9e187aeeb8cbc690cba5c96058581814d0a05fe4b4ce4e1f32451.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82ab1ff424e9e187aeeb8cbc690cba5c96058581814d0a05fe4b4ce4e1f32451.exe
Resource
win10v2004-20240802-en
General
-
Target
82ab1ff424e9e187aeeb8cbc690cba5c96058581814d0a05fe4b4ce4e1f32451
-
Size
1.5MB
-
MD5
d006175e06e99469974ddace7d6ae416
-
SHA1
09de238bc99e7f6626ab2f19537a93c3fb673c7d
-
SHA256
82ab1ff424e9e187aeeb8cbc690cba5c96058581814d0a05fe4b4ce4e1f32451
-
SHA512
bfaf2287602d8bf07597e1f625697ef1f2b154fdad690c099616b46a1c21b41b39a9e7b3f5a01cf6ff3883f18193a95e920cce0a6183201e67432be746851e8b
-
SSDEEP
24576:uYbS97UPZIWQobhes6pTqk/ZtMPgEc98lKI3Pw5Oc9WW3GCon:uYbS975OeY4tMY7Ch3JlCa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82ab1ff424e9e187aeeb8cbc690cba5c96058581814d0a05fe4b4ce4e1f32451
Files
-
82ab1ff424e9e187aeeb8cbc690cba5c96058581814d0a05fe4b4ce4e1f32451.exe windows:4 windows x86 arch:x86
0e61429649537e19804f1244771d655f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
SetCurrentDirectoryA
GetModuleFileNameA
GetStartupInfoA
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
GetLogicalDriveStringsA
GetDriveTypeA
GetACP
LocalFree
FormatMessageA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedExchange
GetTickCount
GetCurrentThreadId
GetSystemInfo
CreateEventA
CloseHandle
ResetEvent
WaitForSingleObject
SetEvent
DuplicateHandle
GetCurrentProcess
WaitForMultipleObjects
CreateSemaphoreA
ReleaseSemaphore
CreateMutexA
OpenMutexA
ReleaseMutex
WideCharToMultiByte
GetLastError
MultiByteToWideChar
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
HeapUnlock
HeapLock
HeapWalk
GetProcessHeaps
QueryPerformanceFrequency
Sleep
QueryPerformanceCounter
SetThreadPriority
GetThreadPriority
GetCurrentThread
SystemTimeToFileTime
GetSystemTime
CompareFileTime
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeFormatA
GetDateFormatA
WriteFile
CreateFileA
DeleteFileA
CreateProcessA
GetUserDefaultLangID
GetTimeZoneInformation
GetUserDefaultLCID
GetSystemDefaultLangID
GetLocaleInfoA
GetCommandLineA
GetWindowsDirectoryA
ResumeThread
SuspendThread
GetVersionExA
GetComputerNameA
GlobalMemoryStatus
GlobalUnlock
GlobalLock
GlobalSize
GlobalFree
GlobalAlloc
ReadFile
FlushFileBuffers
SetFilePointer
GetFileSize
GetFileTime
SetFileTime
SetEndOfFile
GetFileAttributesA
SetFileAttributesA
MoveFileA
CopyFileA
CreateDirectoryA
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
GetDiskFreeSpaceA
CreateIoCompletionPort
GetQueuedCompletionStatus
InterlockedDecrement
InterlockedIncrement
TerminateThread
PostQueuedCompletionStatus
InterlockedCompareExchange
FreeLibrary
GetOEMCP
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetCPInfo
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
IsBadReadPtr
SetStdHandle
GetFileType
GetStringTypeA
SetHandleCount
GetEnvironmentStringsW
GetStdHandle
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
IsBadWritePtr
HeapReAlloc
RaiseException
VirtualFree
SetPriorityClass
GetPriorityClass
TerminateProcess
CreateThread
DeviceIoControl
OutputDebugStringA
GetCurrentProcessId
OpenEventA
HeapCreate
VirtualAlloc
GetSystemDirectoryA
GetTempPathA
HeapFree
SetLastError
VirtualProtectEx
OpenFileMappingA
ExitProcess
RtlUnwind
HeapAlloc
GetEnvironmentVariableA
HeapDestroy
GetVersion
user32
SetClipboardData
EmptyClipboard
DispatchMessageA
TranslateMessage
SetCursorPos
ClientToScreen
ScreenToClient
GetClientRect
MessageBoxA
GetDesktopWindow
SetForegroundWindow
GetDCEx
BeginPaint
EndPaint
DefWindowProcA
UpdateWindow
GetKeyState
MessageBeep
SystemParametersInfoA
WindowFromPoint
SetWindowPlacement
GetWindowPlacement
GetForegroundWindow
SetActiveWindow
LoadImageA
SetClassLongA
DestroyIcon
ShowCursor
DrawFocusRect
SetScrollPos
FillRect
DrawTextA
ReleaseCapture
SetCapture
LoadCursorA
SetCursor
GetScrollInfo
SetScrollInfo
OpenClipboard
GetClipboardData
CloseClipboard
GetSysColor
GetSysColorBrush
GetClassLongA
CallWindowProcA
SetWindowLongA
GetDC
ReleaseDC
GetWindowTextLengthA
GetWindowTextA
TrackPopupMenu
SetWindowTextA
GetWindowInfo
PostMessageA
GetActiveWindow
DestroyWindow
SendMessageA
TranslateAcceleratorA
GetPropA
CreateMenu
CreatePopupMenu
DestroyMenu
DeleteMenu
GetMenuItemCount
InsertMenuItemA
SetMenuItemInfoA
GetMenuItemInfoA
SetMenu
DestroyAcceleratorTable
CreateAcceleratorTableA
DrawMenuBar
CreateDialogIndirectParamA
SetPropA
GetMenu
SetTimer
KillTimer
RemovePropA
EnableWindow
IsWindowEnabled
GetWindowLongA
GetParent
CreateWindowExA
SetParent
GetFocus
IsDialogMessageA
GetMessageA
PeekMessageA
GetWindowRect
GetCursorPos
GetWindow
SetFocus
ShowWindow
IsWindowVisible
InvalidateRect
SetWindowPos
RegisterClassA
LoadCursorFromFileA
UnregisterClassA
SetSystemCursor
CopyImage
comdlg32
GetSaveFileNameA
GetOpenFileNameA
comctl32
ImageList_Destroy
ImageList_Replace
ImageList_Add
ImageList_Create
ImageList_GetImageCount
ImageList_DragEnter
ImageList_BeginDrag
ImageList_DragMove
ImageList_DragShowNolock
ImageList_DragLeave
ImageList_EndDrag
_TrackMouseEvent
InitCommonControlsEx
winmm
timeGetTime
storm
ord506
ord465
ord503
ord268
ord569
ord252
ord578
ord508
ord405
ord570
ord421
ord253
ord265
ord269
ord251
ord266
ord294
ord509
ord571
ord302
ord572
ord507
ord541
ord545
ord548
ord581
ord544
ord575
ord267
ord271
ord542
ord590
ord288
ord280
ord552
ord595
ord551
ord472
ord463
ord279
ord401
ord403
ord474
ord479
ord476
ord504
ord399
ord543
ord501
ord563
msvcrt
qsort
atof
strtoul
atoi
_vsnprintf
_CIpow
memmove
_purecall
strrchr
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_beginthreadex
_ftol
ctime
time
fclose
fprintf
setvbuf
fopen
_control87
_clearfp
??1type_info@@UAE@XZ
advapi32
RegCreateKeyExA
GetUserNameA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
RegOpenKeyA
gdi32
MoveToEx
CreatePen
GetBkColor
CreateRectRgnIndirect
GetStockObject
GetTextExtentPoint32A
SelectObject
DeleteObject
CreateDIBitmap
SetBkColor
SetTextColor
LineTo
SetBkMode
CreateSolidBrush
CombineRgn
FillRgn
CreateCompatibleBitmap
BitBlt
CreateBitmap
CreateCompatibleDC
RectVisible
StretchDIBits
SetStretchBltMode
DeleteDC
StretchBlt
shell32
DragAcceptFiles
FindExecutableA
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
DragQueryFileA
mss32
_AIL_stream_user_data@8
_AIL_start_sequence@4
_AIL_resume_sequence@4
_AIL_set_sequence_loop_count@8
_AIL_sequence_user_data@8
_AIL_set_3D_velocity@20
_AIL_set_3D_sample_preference@12
_AIL_3D_sample_attribute@12
_AIL_set_3D_sample_distances@12
_AIL_set_3D_sample_cone@16
_AIL_set_3D_sample_effects_level@8
_AIL_set_sample_pan@8
_AIL_set_stream_pan@8
_AIL_stream_status@4
_AIL_sample_position@4
_AIL_3D_sample_offset@4
_AIL_stream_position@4
_AIL_stream_ms_position@12
_AIL_3D_sample_length@4
_AIL_set_sample_ms_position@8
_AIL_set_stream_ms_position@8
_AIL_set_3D_sample_obstruction@8
_AIL_set_3D_sample_occlusion@8
_AIL_close_stream@4
_AIL_DLS_compact@4
_AIL_DLS_load_memory@12
_AIL_release_sequence_handle@4
_AIL_release_sample_handle@4
_AIL_release_3D_sample_handle@4
_AIL_find_DLS@24
_AIL_extract_DLS@28
_AIL_decompress_ADPCM@12
_AIL_decompress_ASI@24
_AIL_set_stream_user_data@12
_AIL_register_stream_callback@8
_AIL_sample_user_data@8
_AIL_set_sample_loop_count@8
_AIL_sample_playback_rate@4
_AIL_set_3D_user_data@12
_AIL_set_sample_playback_rate@8
_AIL_register_3D_EOS_callback@8
_AIL_start_sample@4
_AIL_3D_user_data@8
_AIL_set_3D_sample_info@8
_AIL_set_3D_sample_loop_count@8
_AIL_3D_sample_playback_rate@4
_AIL_set_3D_sample_playback_rate@8
_AIL_resume_3D_sample@4
_AIL_open_stream@12
_AIL_set_sample_volume@8
_AIL_stop_sample@4
_AIL_set_stream_loop_count@8
_AIL_stop_3D_sample@4
_AIL_set_stream_volume@8
_AIL_pause_stream@8
_AIL_set_sequence_volume@12
_AIL_stop_sequence@4
_AIL_allocate_sequence_handle@4
_AIL_allocate_sample_handle@4
_AIL_end_3D_sample@4
_AIL_set_sequence_user_data@12
_AIL_register_sequence_callback@8
_AIL_allocate_3D_sample_handle@4
_AIL_set_sample_user_data@12
_AIL_end_sequence@4
_AIL_sequence_status@4
_AIL_sample_status@4
_AIL_3D_sample_status@4
_AIL_digital_CPU_percent@4
_AIL_set_3D_speaker_type@8
_AIL_set_3D_provider_preference@12
_AIL_set_3D_room_type@8
_AIL_set_3D_orientation@28
_AIL_set_3D_position@16
_AIL_set_XMIDI_master_volume@8
_AIL_shutdown@0
_AIL_close_3D_provider@4
_AIL_close_3D_listener@4
_AIL_open_3D_provider@4
_AIL_open_3D_listener@4
_AIL_set_3D_distance_factor@8
_AIL_enumerate_3D_providers@12
_AIL_close_XMIDI_driver@4
_AIL_open_XMIDI_driver@4
_AIL_last_error@0
_AIL_DLS_close@8
_AIL_DLS_open@28
_AIL_mem_use_malloc@4
_AIL_mem_use_free@4
_AIL_set_redist_directory@4
_AIL_startup@0
_AIL_close_digital_driver@4
_AIL_open_digital_driver@16
_AIL_set_file_callbacks@16
_AIL_file_type@8
_AIL_MIDI_to_XMI@20
_AIL_init_sequence@12
_AIL_sequence_ms_position@12
_AIL_mem_free_lock@4
_AIL_init_sample@4
_AIL_set_named_sample_file@20
_AIL_WAV_info@8
_AIL_sample_ms_position@12
_AIL_register_EOS_callback@8
_AIL_end_sample@4
_AIL_stream_playback_rate@4
_AIL_set_3D_sample_volume@8
_AIL_DLS_unload@8
_AIL_set_stream_playback_rate@8
_AIL_resume_sample@4
wsock32
listen
gethostname
ntohl
inet_addr
ntohs
ioctlsocket
recv
send
recvfrom
sendto
gethostbyname
connect
WSACleanup
WSAStartup
inet_ntoa
bind
getpeername
htons
accept
getsockname
setsockopt
socket
WSAGetLastError
closesocket
select
imm32
ImmAssociateContextEx
ImmAssociateContext
wininet
InternetCanonicalizeUrlA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.iyhivx Size: 536KB - Virtual size: 536KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.wwaw Size: 528KB - Virtual size: 525KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ