Static task
static1
Behavioral task
behavioral1
Sample
85a81ffdafd1ac20e5b02b995d48a762e1b46d4d5569b136e291d2548d84daf6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
85a81ffdafd1ac20e5b02b995d48a762e1b46d4d5569b136e291d2548d84daf6N.exe
Resource
win10v2004-20240802-en
General
-
Target
85a81ffdafd1ac20e5b02b995d48a762e1b46d4d5569b136e291d2548d84daf6N
-
Size
3.1MB
-
MD5
8977b892c16f6e1fa5da06b44aa4f560
-
SHA1
b0699c8ad599cb7e7d841e18c40818cbbae5cf95
-
SHA256
85a81ffdafd1ac20e5b02b995d48a762e1b46d4d5569b136e291d2548d84daf6
-
SHA512
531e46d5ae3c640f313a57ccba540a14da86bb24ebba4ca10fc99f01a820cd29ba51f3db5e77f297bed82fdedb1c4fff8f76f9a4e679997172b8a000626ab70b
-
SSDEEP
49152:UuNJ+eOslNKvPL1lsEMiS82Lk95f8/76wTDmSMPPJt:UYJ+vKsnLNMiZuy6/76eDmSMPRt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85a81ffdafd1ac20e5b02b995d48a762e1b46d4d5569b136e291d2548d84daf6N
Files
-
85a81ffdafd1ac20e5b02b995d48a762e1b46d4d5569b136e291d2548d84daf6N.exe windows:4 windows x86 arch:x86
19c33f8b7ed5882fd9b32f269e5b7b8a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmGetContext
comctl32
ImageList_DragShowNolock
ImageList_EndDrag
ImageList_GetBkColor
ImageList_GetDragImage
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_GetImageInfo
ImageList_LoadImageW
ImageList_Read
ImageList_DragMove
ImageList_Replace
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_SetIconSize
ImageList_SetImageCount
ImageList_SetOverlayImage
ImageList_Write
ord17
InitializeFlatSB
ImageList_DragLeave
ImageList_DragEnter
ImageList_Destroy
ImageList_Create
ImageList_Copy
ImageList_BeginDrag
ImageList_Add
FlatSB_SetScrollProp
FlatSB_SetScrollPos
FlatSB_SetScrollInfo
FlatSB_GetScrollPos
ImageList_Remove
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
kernel32
CreateFileMappingW
CreateFileW
CreateMutexW
CreateThread
DeleteCriticalSection
EnumCalendarInfoW
EnumResourceNamesW
EnumSystemLocalesW
ExitProcess
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FormatMessageW
FreeResource
GetACP
GetCommandLineW
GetConsoleCP
GetConsoleOutputCP
GetCPInfoExW
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceW
GetDriveTypeW
GetExitCodeThread
GetFileAttributesW
GetFileSize
GetFileType
GetFullPathNameW
GetLastError
GetLocaleInfoW
GetLocalTime
GetLogicalDriveStringsW
GetModuleFileNameW
GetModuleHandleW
GetPrivateProfileStringW
GetStdHandle
GetStringTypeExA
GetStringTypeExW
GetSystemInfo
GetThreadLocale
GetThreadPriority
GetTimeZoneInformation
GetVersion
GetVersionExW
GetVolumeInformationW
GlobalAddAtomW
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomW
GlobalFree
GlobalHandle
GlobalLock
GetStartupInfoW
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapSize
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
IsValidLocale
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LockResource
lstrcmpW
lstrcpynW
lstrlenW
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenFileMappingW
OpenMutexW
OpenProcess
QueryDosDeviceW
QueryPerformanceCounter
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
ResetEvent
ResumeThread
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetThreadLocale
SetThreadPriority
SizeofResource
Sleep
SuspendThread
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualProtect
VirtualQuery
VirtualQueryEx
WaitForMultipleObjectsEx
WaitForSingleObjectEx
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
HeapReAlloc
GetOEMCP
GetCPInfo
GetVersionExA
GetEnvironmentVariableA
TlsAlloc
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
GetCurrentProcess
TerminateProcess
GetStartupInfoA
GetModuleHandleA
RtlUnwind
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
FreeLibrary
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
GlobalSize
user32
GetActiveWindow
GetCapture
GetCaretPos
GetClassInfoExW
GetClassInfoW
GetClassLongW
GetClassNameW
GetClientRect
GetClipboardData
GetClipboardFormatNameW
GetCursorPos
GetDCEx
GetDesktopWindow
GetDlgCtrlID
GetDlgItem
GetDoubleClickTime
GetFocus
GetForegroundWindow
GetIconInfo
GetKeyboardLayoutList
GetKeyboardLayoutNameW
GetKeyboardState
GetKeyNameTextW
GetKeyState
GetLastActivePopup
GetMenuItemCount
GetMenuItemID
GetMenuItemInfoW
GetMenuItemRect
GetMenuState
GetMenuStringW
GetMessageExtraInfo
GetMessagePos
GetMessageTime
GetParent
GetPropW
GetScrollInfo
GetScrollPos
GetScrollRange
GetSubMenu
GetSysColorBrush
GetSystemMenu
GetSystemMetrics
GetTopWindow
GetUpdateRect
GetWindowDC
GetWindowLongW
GetWindowPlacement
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
HideCaret
InflateRect
InsertMenuItemW
InsertMenuW
InvalidateRect
InvalidateRgn
IsCharAlphaNumericW
IsCharAlphaW
IsChild
IsClipboardFormatAvailable
IsDialogMessageA
IsDialogMessageW
IsIconic
IsRectEmpty
IsWindowEnabled
IsWindowUnicode
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapW
LoadCursorW
LoadIconW
LoadKeyboardLayoutW
LoadStringW
LockWindowUpdate
MapVirtualKeyW
MapWindowPoints
MessageBeep
MessageBoxA
MessageBoxIndirectW
EmptyClipboard
MoveWindow
MsgWaitForMultipleObjectsEx
OffsetRect
OpenClipboard
EnumWindows
PeekMessageW
PostMessageW
PostQuitMessage
PtInRect
RedrawWindow
RegisterClassW
RegisterClipboardFormatW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropW
ScreenToClient
ScrollWindowEx
SendMessageA
SendMessageW
SetActiveWindow
SetCapture
SetCaretPos
SetClassLongW
SetClipboardData
SetClipboardViewer
SetCursorPos
SetFocus
SetForegroundWindow
SetKeyboardState
SetMenuItemInfoW
SetParent
SetPropW
SetRect
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowsHookExW
SetWindowTextW
ShowCaret
ShowOwnedPopups
ShowScrollBar
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnregisterClassW
UpdateWindow
ValidateRect
WaitMessage
WindowFromDC
WindowFromPoint
VkKeyScanA
CallWindowProcW
ChangeClipboardChain
CharLowerBuffA
CharLowerBuffW
CharLowerW
CharNextW
CharUpperBuffA
DrawTextW
DrawTextExW
DrawMenuBar
DrawIconEx
DrawFrameControl
DrawFocusRect
DrawEdge
DrawAnimatedRects
DispatchMessageW
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
FindWindowW
FindWindowExW
MessageBoxW
FillRect
CharUpperBuffW
CharUpperW
CheckMenuItem
ChildWindowFromPoint
ClientToScreen
CloseClipboard
CopyIcon
CopyImage
CopyRect
CountClipboardFormats
EnumThreadWindows
EnumClipboardFormats
EnumChildWindows
EnableWindow
EnableScrollBar
PeekMessageA
EnableMenuItem
DestroyCaret
DeleteMenu
DefWindowProcW
DefMDIChildProcW
DefFrameProcW
CreateWindowExW
CreatePopupMenu
CreateMenu
CreateIconIndirect
CreateCaret
CreateAcceleratorTableW
FrameRect
winspool.drv
EnumPrintersW
OpenPrinterW
DocumentPropertiesW
ClosePrinter
comdlg32
CommDlgExtendedError
advapi32
RegDeleteValueW
RegUnLoadKeyW
RegSetValueExW
RegSaveKeyW
RegRestoreKeyW
RegReplaceKeyW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegLoadKeyW
RegFlushKey
RegEnumValueW
RegEnumKeyExW
shell32
ShellExecuteExW
Shell_NotifyIconW
ShellExecuteW
ole32
CoCreateGuid
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
oleaut32
VariantCopyInd
VariantClear
VariantChangeType
SysReAllocStringLen
SysFreeString
VariantInit
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 936KB - Virtual size: 936KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ