Static task
static1
Behavioral task
behavioral1
Sample
0d3d8d01b79bf0c4bee2a720c0a927c57d4121cde66b6b11508c308f62d29533.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d3d8d01b79bf0c4bee2a720c0a927c57d4121cde66b6b11508c308f62d29533.exe
Resource
win10v2004-20240802-en
General
-
Target
0d3d8d01b79bf0c4bee2a720c0a927c57d4121cde66b6b11508c308f62d29533
-
Size
12.9MB
-
MD5
ed93da6c18d7494de4254a345ad7e911
-
SHA1
daaf3be3285f4bba0b1864b2df0f2e1743d072dc
-
SHA256
0d3d8d01b79bf0c4bee2a720c0a927c57d4121cde66b6b11508c308f62d29533
-
SHA512
79a17467704ffeff150e7b65f655e5fcfc7a33268466037944a7278733425ab89a403d118c1f32a39eb442767474e1bbfef3f88281fbe49c134ffa5753fe9488
-
SSDEEP
196608:m39xuXgqd56Rm0Abq3IOCdMJsv6tWKFdu9C8GXt7j:m3j+dwAFdWJsv6tWKFdu9Cxt7j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d3d8d01b79bf0c4bee2a720c0a927c57d4121cde66b6b11508c308f62d29533
Files
-
0d3d8d01b79bf0c4bee2a720c0a927c57d4121cde66b6b11508c308f62d29533.exe windows:5 windows x86 arch:x86
3529e65bb29d888eb84c5e8078b336d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoUninitialize
StringFromGUID2
CoTaskMemAlloc
CoGetMalloc
ReleaseStgMedium
CoTaskMemFree
DoDragDrop
OleIsCurrentClipboard
OleFlushClipboard
OleGetClipboard
OleSetClipboard
CoCreateGuid
CoInitialize
OleUninitialize
OleInitialize
RevokeDragDrop
RegisterDragDrop
CoLockObjectExternal
CoCreateInstance
imm32
ImmGetContext
ImmGetVirtualKey
ImmSetCandidateWindow
ImmSetCompositionWindow
ImmNotifyIME
ImmGetCompositionStringW
ImmAssociateContext
ImmReleaseContext
ImmGetDefaultIMEWnd
winmm
PlaySoundW
timeGetTime
oleaut32
SysFreeString
SysAllocStringLen
SysStringLen
VariantInit
VariantChangeType
SystemTimeToVariantTime
SysAllocString
shlwapi
PathFileExistsA
StrChrA
StrPBrkA
shell32
CommandLineToArgvW
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
Shell_NotifyIconW
SHGetFileInfoW
ShellExecuteW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
gdi32
GetStockObject
GetDIBits
CreateBitmap
ExtTextOutW
SetWorldTransform
SetTextAlign
SetTextColor
SetGraphicsMode
SetBkMode
GetCharABCWidthsI
CombineRgn
CreateCompatibleDC
CreateRectRgn
DeleteDC
DeleteObject
GetRegionData
SelectClipRgn
SelectObject
CreateDIBSection
GdiFlush
BitBlt
OffsetRgn
GetDeviceCaps
CreateCompatibleBitmap
CreateDCW
EnumFontFamiliesExW
CreateFontIndirectW
GetFontData
AddFontResourceExW
RemoveFontResourceExW
AddFontMemResourceEx
RemoveFontMemResourceEx
GetTextMetricsW
GetObjectW
GetTextFaceW
ChoosePixelFormat
DescribePixelFormat
GetPixelFormat
SetPixelFormat
SwapBuffers
GetBitmapBits
GetCharABCWidthsW
GetCharABCWidthsFloatW
GetGlyphOutlineW
GetOutlineTextMetricsW
GetTextExtentPoint32W
iphlpapi
GetAdaptersInfo
GetAdaptersAddresses
ws2_32
WSAAccept
WSAConnect
WSAHtonl
select
__WSAFDIsSet
gethostbyaddr
inet_addr
gethostbyname
inet_ntoa
listen
gethostname
WSAAsyncSelect
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
recv
WSAGetOverlappedResult
WSACleanup
WSAStartup
socket
WSANtohl
bind
freeaddrinfo
getaddrinfo
WSAStringToAddressA
WSAAddressToStringA
WSASendTo
WSASend
WSARecvFrom
WSARecv
WSAIoctl
WSASetLastError
shutdown
setsockopt
send
ntohs
ntohl
htons
htonl
getsockopt
getsockname
getpeername
ioctlsocket
closesocket
WSAGetLastError
WSANtohs
WSASocketW
connect
advapi32
CryptAcquireContextA
RegQueryInfoKeyW
RegFlushKey
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
GetTokenInformation
GetLengthSid
CryptEnumProvidersA
CryptSignHashA
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
RegSetValueExW
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
FreeSid
OpenProcessToken
CopySid
user32
IsZoomed
PeekMessageW
SetCaretPos
HideCaret
DestroyCaret
CreateCaret
GetKeyboardLayout
GetAsyncKeyState
RegisterClipboardFormatW
ChangeClipboardChain
SetClipboardViewer
LoadIconW
EnumDisplayMonitors
GetMonitorInfoW
LoadImageW
GetSysColorBrush
ChildWindowFromPointEx
GetCursorPos
GetClientRect
GetFocus
RegisterClassExW
UnregisterClassW
GetKeyboardLayoutList
GetAncestor
DestroyCursor
SetParent
GetParent
SetWindowLongW
GetWindowLongW
ScreenToClient
ClientToScreen
SetCursor
AdjustWindowRectEx
GetWindowRect
SetWindowTextW
InvalidateRect
GetUpdateRect
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
ReleaseCapture
SetCapture
GetCapture
SetFocus
IsIconic
GetClipboardFormatNameW
SetWindowPlacement
GetKeyState
SetWindowPos
MoveWindow
FlashWindowEx
ShowWindow
IsChild
AttachThreadInput
PostMessageW
GetDesktopWindow
GetCaretBlinkTime
MessageBeep
IsWindow
GetDoubleClickTime
SetWindowRgn
SystemParametersInfoW
GetSysColor
DestroyIcon
GetWindowThreadProcessId
DestroyWindow
CreateWindowExW
DefWindowProcW
SendMessageW
RegisterWindowMessageW
EnableMenuItem
GetSystemMenu
ReleaseDC
GetDC
GetSystemMetrics
MsgWaitForMultipleObjects
PeekMessageA
DispatchMessageA
TranslateMessage
GetKeyboardState
ToAscii
TrackMouseEvent
GetMessageExtraInfo
GetWindowTextW
EnumWindows
ToUnicode
MapVirtualKeyW
DispatchMessageW
GetQueueStatus
MsgWaitForMultipleObjectsEx
SetTimer
KillTimer
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
PostThreadMessageW
CharNextExA
GetMenu
TrackPopupMenuEx
SetMenuItemInfoW
NotifyWinEvent
SetCursorPos
GetCursor
LoadCursorW
CreateCursor
CreateIconIndirect
GetIconInfo
GetCursorInfo
GetWindowPlacement
RegisterClassW
RealGetWindowClassW
MessageBoxW
DrawIconEx
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
IsWindowVisible
GetClassInfoW
crypt32
CertGetCertificateContextProperty
CertCreateCertificateContext
CertFreeCertificateContext
CertGetCertificateChain
CertFreeCertificateChain
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
kernel32
LoadLibraryExW
RtlUnwind
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetStringTypeW
GetCPInfo
EncodePointer
IsDebuggerPresent
VirtualFree
VirtualAlloc
CreateMutexW
ReleaseMutex
FlushFileBuffers
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
MoveFileW
CopyFileW
GetTempPathW
RemoveDirectoryW
GetLogicalDrives
GetFullPathNameW
GetFileInformationByHandle
FindCloseChangeNotification
FindFirstChangeNotificationW
FindNextChangeNotification
FindFirstFileExW
SetEndOfFile
GetModuleHandleExW
ReadFileEx
PeekNamedPipe
CancelIo
SleepEx
ExitThread
FreeLibraryAndExitThread
SetFilePointerEx
GetFileAttributesW
FindFirstFileW
FindClose
DeleteFileW
CreateDirectoryW
GetCurrentDirectoryW
SetConsoleCtrlHandler
GetFileAttributesExW
GetUserGeoID
GetGeoInfoW
GetTimeZoneInformation
CreateSemaphoreW
GetConsoleMode
MoveFileExW
GetEnvironmentStringsW
FreeEnvironmentStringsW
ConnectNamedPipe
CreateNamedPipeW
GetExitCodeProcess
GetProcessId
VirtualQuery
FindNextFileW
OpenFileMappingW
ReadConsoleInputA
SetConsoleMode
GetCommandLineA
ReadConsoleW
GetConsoleCP
SetFileAttributesW
SetStdHandle
GetModuleFileNameW
GetStartupInfoW
GetUserDefaultUILanguage
GetCurrencyFormatW
GetTimeFormatW
GetDateFormatW
LCMapStringW
GetSystemDirectoryW
WaitForSingleObjectEx
GetLocalTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
ResumeThread
GetThreadPriority
SetThreadPriority
GetCurrentThread
CreateThread
DuplicateHandle
GetCommandLineW
GetUserDefaultLCID
CompareStringW
OutputDebugStringW
SystemTimeToFileTime
GetSystemTime
FlushConsoleInputBuffer
GlobalMemoryStatus
GetTickCount
GetFileType
SetHandleInformation
CreateEventW
LoadLibraryW
DeviceIoControl
ExitProcess
GetConsoleWindow
MapViewOfFile
CreateFileMappingW
SetFilePointer
ReadFile
CreateFileW
GlobalSize
GetLocaleInfoW
GlobalUnlock
GlobalLock
GlobalAlloc
CheckRemoteDebuggerPresent
GetUserDefaultLangID
CreateProcessW
ExpandEnvironmentStringsW
SetErrorMode
IsValidLocale
IsValidLanguageGroup
FormatMessageW
LocalFree
GetDriveTypeW
GetLongPathNameW
lstrcmpW
GetVolumeInformationW
GetModuleHandleW
WriteFileEx
GetVersionExA
GetVolumeInformationA
DeleteFileA
CreateProcessA
WriteFile
ReadProcessMemory
OpenProcess
GlobalMemoryStatusEx
QueryPerformanceFrequency
QueryPerformanceCounter
LoadLibraryA
FreeLibrary
GetCurrentDirectoryA
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
FindNextFileA
FindFirstFileA
GetModuleFileNameA
GetSystemTimeAsFileTime
GetStdHandle
InitializeCriticalSection
Sleep
UnmapViewOfFile
WaitForMultipleObjects
InterlockedExchangeAdd
GetNativeSystemInfo
WideCharToMultiByte
MultiByteToWideChar
MapViewOfFileEx
CreateFileA
GetModuleHandleA
CreateFileMappingA
GetFileSize
GetProcAddress
CreateSemaphoreA
ReleaseSemaphore
CreateIoCompletionPort
SwitchToThread
CreateEventA
GetSystemInfo
CloseHandle
WaitForSingleObject
GetACP
EnumSystemLocalesW
IsValidCodePage
GetOEMCP
SetEnvironmentVariableA
WriteConsoleW
FindFirstFileExA
DecodePointer
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
HeapCreate
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
GetCurrentThreadId
SetLastError
TerminateThread
GetQueuedCompletionStatus
PostQueuedCompletionStatus
SetEvent
ResetEvent
Sections
.text Size: 8.1MB - Virtual size: 8.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 161KB - Virtual size: 219KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 17B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qtmetad Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 1024B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 289KB - Virtual size: 289KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ