Static task
static1
Behavioral task
behavioral1
Sample
2126db06aef4830c5ca81a06bdc41c535150c25819a26f7a71f3eda7d77def0eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2126db06aef4830c5ca81a06bdc41c535150c25819a26f7a71f3eda7d77def0eN.exe
Resource
win10v2004-20240802-en
General
-
Target
2126db06aef4830c5ca81a06bdc41c535150c25819a26f7a71f3eda7d77def0eN
-
Size
8.7MB
-
MD5
b65a63d72eef33d9080cbd7b67765e70
-
SHA1
d03e7d870be662d2dd13a79eb90796df124806de
-
SHA256
2126db06aef4830c5ca81a06bdc41c535150c25819a26f7a71f3eda7d77def0e
-
SHA512
ed7e636c3ae9636ef5be5963ff4a375022501c673f6da4c0c42a3b180aeabf28d75ed45e3ec5d8d3eb9d54924f8f52cd4c235e253484e6178b09cc5953b35e12
-
SSDEEP
98304:dBt7GGYoxXJgc80PlTTwqZyteyzgIXcYbQTIMsAVuQDjgV/Fgvn:dBhxYuJggOe3IK8MsAkQDUbW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2126db06aef4830c5ca81a06bdc41c535150c25819a26f7a71f3eda7d77def0eN
Files
-
2126db06aef4830c5ca81a06bdc41c535150c25819a26f7a71f3eda7d77def0eN.exe windows:6 windows x86 arch:x86
07ec306d8c265e055632800f0622f63c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundA
kernel32
GetProcessHeap
GetTimeFormatA
GetDateFormatA
SizeofResource
FindResourceA
GetLocaleInfoA
Sleep
LockResource
CloseHandle
CreateThread
FindResourceExW
LoadResource
FindResourceW
GetTickCount
GlobalMemoryStatus
FlushConsoleInputBuffer
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetConsoleCP
DeleteCriticalSection
GetCurrentDirectoryW
GetFullPathNameW
SetConsoleMode
ReadConsoleInputW
WideCharToMultiByte
GetFileSize
CreateFileA
WriteFile
ReadFile
DeleteFileA
WriteConsoleW
SetEndOfFile
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
HeapDestroy
DecodePointer
HeapAlloc
GetACP
IsValidCodePage
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionEx
HeapFree
MulDiv
FindFirstFileExW
ReadConsoleW
FlushFileBuffers
SetConsoleCtrlHandler
SetFilePointerEx
CreateDirectoryA
GetFileAttributesA
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetLocalTime
FreeLibrary
GetProcAddress
LoadLibraryA
MoveFileExA
MultiByteToWideChar
GetCurrentDirectoryA
LocalFileTimeToFileTime
SetFileTime
SystemTimeToFileTime
FileTimeToLocalFileTime
GetFileInformationByHandle
GetTickCount64
MapViewOfFile
UnmapViewOfFile
FileTimeToDosDateTime
CreateFileMappingA
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
ExitProcess
OpenProcess
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
CopyFileA
CreateFileW
ReleaseMutex
WaitForSingleObject
CreateMutexA
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
CopyFileW
CompareFileTime
FindFirstFileExA
SetLastError
GetSystemTime
IsDebuggerPresent
OutputDebugStringW
RaiseException
GlobalAlloc
GlobalFree
lstrlenA
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetTimeZoneInformation
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
user32
GetActiveWindow
IsWindowEnabled
GetSystemMetrics
SetActiveWindow
InvalidateRgn
GetWindowTextA
MessageBoxA
WindowFromPoint
GetDesktopWindow
EnumChildWindows
EnumWindows
GetClassNameA
GetWindowThreadProcessId
GetMonitorInfoA
EnumDisplayMonitors
wsprintfA
RegisterWindowMessageA
GetMessageA
TranslateMessage
DispatchMessageA
PeekMessageA
GetDoubleClickTime
SetLayeredWindowAttributes
DialogBoxParamA
GetKeyState
GetKeyNameTextA
MapVirtualKeyA
SetCapture
ReleaseCapture
GetForegroundWindow
SetWindowTextA
AdjustWindowRectEx
MessageBeep
SetCursor
ChildWindowFromPoint
SetClassLongA
FindWindowExA
LoadIconA
DestroyIcon
IsDialogMessageA
MonitorFromRect
MonitorFromWindow
SetProcessDPIAware
IsZoomed
IsRectEmpty
DrawFrameControl
WindowFromDC
GetSysColor
CreateIconIndirect
GetIconInfo
SystemParametersInfoA
GetDC
SetParent
GetWindowDC
DrawFocusRect
SetScrollInfo
IsWindowVisible
TrackPopupMenuEx
InsertMenuItemA
LookupIconIdFromDirectoryEx
CreateIconFromResourceEx
SetDlgItemTextW
SendMessageA
GetParent
RedrawWindow
EnableWindow
EndPaint
BeginPaint
InvalidateRect
FillRect
SetForegroundWindow
LoadCursorA
ScreenToClient
AdjustWindowRect
RegisterClassA
DrawIconEx
PostQuitMessage
PtInRect
IsIconic
ReleaseDC
GetCursorPos
LoadImageA
GetWindowRect
GetFocus
DestroyWindow
SetWindowPos
PostMessageA
EndDialog
ShowWindow
GetAsyncKeyState
GetDlgItemTextA
SetTimer
SetWindowLongA
GetDlgCtrlID
CallWindowProcA
MapWindowPoints
GetWindowLongA
DefWindowProcA
CreateWindowExA
SetFocus
BringWindowToTop
SendDlgItemMessageA
SetDlgItemTextA
CreateDialogParamA
GetClientRect
GetDlgItem
KillTimer
DrawTextA
CopyRect
FrameRect
SetRect
GetProcessWindowStation
GetUserObjectInformationW
CreatePopupMenu
OffsetRect
gdi32
GetTextExtentPoint32A
PatBlt
SelectClipRgn
GetDIBits
CreateRectRgnIndirect
BitBlt
GetDeviceCaps
CreateFontA
StretchDIBits
SetBkMode
LineTo
CreatePen
Rectangle
MoveToEx
CreateRectRgn
CreateSolidBrush
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetStockObject
GetPixel
DeleteDC
SetTextColor
CreatePalette
SetBkColor
DeleteObject
SetDCBrushColor
SetDCPenColor
PlayEnhMetaFile
SetMapMode
CreateDIBSection
GetObjectA
CombineRgn
SetStretchBltMode
SetDIBits
SetWinMetaFileBits
SetEnhMetaFileBits
ExtTextOutA
GetEnhMetaFilePaletteEntries
GetEnhMetaFileHeader
DeleteEnhMetaFile
SelectPalette
RealizePalette
CreateBitmap
Ellipse
Polygon
comdlg32
GetSaveFileNameA
ChooseFontA
CommDlgExtendedError
GetOpenFileNameA
ChooseColorA
shell32
SHFileOperationA
FindExecutableA
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
SHCreateItemFromIDList
ShellExecuteA
Shell_NotifyIconA
wsock32
htons
WSAGetLastError
WSAStartup
gethostbyname
WSASetLastError
socket
shutdown
closesocket
connect
inet_ntoa
recv
select
send
shlwapi
ord176
comctl32
ImageList_Create
ImageList_Destroy
ImageList_ReplaceIcon
_TrackMouseEvent
InitCommonControlsEx
version
VerQueryValueA
GetFileVersionInfoA
msimg32
GradientFill
advapi32
ReportEventA
RegisterEventSourceA
CryptVerifySignatureA
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptImportKey
CryptReleaseContext
OpenProcessToken
GetTokenInformation
ImpersonateLoggedOnUser
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
CryptAcquireContextA
DeregisterEventSource
ole32
CoTaskMemFree
CoInitialize
OleInitialize
CoCreateInstance
OleUninitialize
CoUninitialize
oleaut32
SysAllocString
VariantClear
SysFreeString
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 499KB - Virtual size: 498KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 962KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.7MB - Virtual size: 5.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ