Static task
static1
Behavioral task
behavioral1
Sample
ac5ff288fd7683a259c1c7469dcee75e2384785e2907d939570136a4be551278.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ac5ff288fd7683a259c1c7469dcee75e2384785e2907d939570136a4be551278.exe
Resource
win10v2004-20240910-en
General
-
Target
ac5ff288fd7683a259c1c7469dcee75e2384785e2907d939570136a4be551278
-
Size
2.0MB
-
MD5
70472acd1d82e23fd86e99900d657b4d
-
SHA1
94ab2eddb0e63137b2b79ac7cb764e73ec15670d
-
SHA256
ac5ff288fd7683a259c1c7469dcee75e2384785e2907d939570136a4be551278
-
SHA512
e125bce905447bebb16895dc36a8932f789e31d670981f1802d435461c298703d11a57ebeda8bde8a1f661aa79367143583e5d92c93ba1ad6932016edb59afb1
-
SSDEEP
49152:Nf/eVF5WoKbhtiTwOqylCucSgcoFEeXA8xDCxakE6dgxzIhOn/rIkLf:NHKUoKNAEylCxca42/rIk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac5ff288fd7683a259c1c7469dcee75e2384785e2907d939570136a4be551278
Files
-
ac5ff288fd7683a259c1c7469dcee75e2384785e2907d939570136a4be551278.exe windows:6 windows x86 arch:x86
43dbd232ca14c46707f805550c4a50d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
LoadLibraryExW
GetFileSizeEx
WritePrivateProfileStringW
GetTimeZoneInformation
CreateFileA
FileTimeToSystemTime
TerminateThread
GlobalAlloc
GlobalLock
SystemTimeToTzSpecificLocalTime
GlobalUnlock
GetFileTime
GetCurrentProcess
GetVersion
GetExitCodeProcess
WriteConsoleW
ReadConsoleW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileType
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
CloseHandle
FreeLibrary
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStringTypeW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
OutputDebugStringW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
EncodePointer
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
HeapReAlloc
MultiByteToWideChar
GetModuleHandleW
GetProcessHeap
ExitProcess
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
FindResourceExW
GetStdHandle
RaiseException
HeapSize
InitializeCriticalSectionEx
GetCurrentThreadId
CreateMutexW
SizeofResource
LeaveCriticalSection
GetModuleFileNameW
GetPrivateProfileIntW
EnterCriticalSection
HeapFree
GetProcAddress
LoadLibraryW
GetLastError
SetLastError
FindResourceW
LoadResource
LockResource
CreateEventW
CreateFileW
LocalAlloc
WaitForSingleObject
WriteFile
SetEndOfFile
user32
PostMessageW
GetDC
GetPropW
SendMessageW
CallWindowProcW
GetWindowLongW
GetWindowTextW
GetParent
GetWindowRect
GetWindowTextLengthW
GetClassNameW
EnumChildWindows
GetClientRect
InvalidateRgn
IsIconic
RegisterWindowMessageW
SetWindowLongW
SetPropW
IsWindow
RemovePropW
DialogBoxParamW
BeginPaint
EndPaint
SetForegroundWindow
SetWindowTextW
MessageBoxW
GetSystemMenu
GetWindow
SetWindowPos
CheckRadioButton
MonitorFromWindow
EndDialog
GetSystemMetrics
OpenClipboard
GetDlgItemTextA
SetTimer
GetMonitorInfoW
CloseClipboard
EmptyClipboard
SetDlgItemTextW
MapWindowPoints
IsDlgButtonChecked
SetFocus
GetClipboardData
SetDlgItemTextA
SetClipboardData
GetDlgItem
AppendMenuW
KillTimer
EnableMenuItem
LoadImageW
InvalidateRect
EnableWindow
CheckDlgButton
GetLastActivePopup
DefWindowProcW
DestroyWindow
UnregisterClassW
GetActiveWindow
ShowWindow
SwitchToThisWindow
CharNextW
FindWindowW
gdi32
SetBkMode
PatBlt
GetStockObject
SetTextColor
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegOpenKeyExW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegCloseKey
GetTokenInformation
CheckTokenMembership
CreateWellKnownSid
OpenProcessToken
RegDeleteValueW
shell32
ord680
DragQueryFileW
DragAcceptFiles
ShellExecuteExW
DragFinish
ole32
CoTaskMemAlloc
CoUninitialize
PropVariantClear
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoInitialize
oleaut32
VarUI4FromStr
shlwapi
PathAppendW
PathRemoveFileSpecW
comctl32
InitCommonControlsEx
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ