Static task
static1
Behavioral task
behavioral1
Sample
48630e76e438952a2030f1db408993e088839a801243b5d42e559afda4189f33.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
48630e76e438952a2030f1db408993e088839a801243b5d42e559afda4189f33.exe
Resource
win10v2004-20240802-en
General
-
Target
48630e76e438952a2030f1db408993e088839a801243b5d42e559afda4189f33.exe
-
Size
9.0MB
-
MD5
889e6365d82a9a89b6c8c86d672b8f0c
-
SHA1
59e293623e4fb828a29fb982d5ac9a4f993abc3b
-
SHA256
48630e76e438952a2030f1db408993e088839a801243b5d42e559afda4189f33
-
SHA512
cae479080f68f4f935a0694a5f948675c5c4be1a5dbcf437512af7f0ca801a129313daf915cefecbb62484b90c0579d1e50c9c4951bcc84dcdf5c814a8b231c0
-
SSDEEP
24576:i09gMRNaC6s6Hp15O3N22845VjpQaRdQtzHmhwFb+a:nWAd6sQp15/VgV9RdQxHmhwFb+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48630e76e438952a2030f1db408993e088839a801243b5d42e559afda4189f33.exe
Files
-
48630e76e438952a2030f1db408993e088839a801243b5d42e559afda4189f33.exe.exe windows:6 windows x64 arch:x64
bf2b250b786a474003e3b54a7aae5566
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
wsprintfW
SystemParametersInfoW
LoadImageW
LoadBitmapW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
FindWindowA
SetWindowLongW
GetWindowLongW
SetRect
FillRect
MessageBoxA
GetClientRect
InvalidateRect
EndPaint
BeginPaint
DrawTextA
GetSystemMetrics
KillTimer
SetTimer
GetAsyncKeyState
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
GetDlgItemTextA
GetDlgItem
DialogBoxParamW
SetWindowPos
SetLayeredWindowAttributes
ShowWindow
PostMessageW
DispatchMessageW
TranslateMessage
GetMessageW
MessageBoxW
gdi32
TextOutA
GetObjectW
SetTextColor
StretchBlt
SetBkMode
SelectObject
GetStockObject
DeleteObject
DeleteDC
CreateSolidBrush
CreateFontA
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
shell32
SHGetFolderPathA
SHGetSpecialFolderPathA
advapi32
RegOpenKeyExW
RegDeleteKeyA
RegCreateKeyExW
RegCloseKey
RegSetValueExW
kernel32
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetCommandLineW
LCMapStringW
GetOEMCP
GetSystemInfo
HeapValidate
HeapSize
QueryPerformanceFrequency
ExitProcess
WriteConsoleW
GetModuleHandleExW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetCurrentThread
SetStdHandle
OutputDebugStringW
SetConsoleCtrlHandler
HeapReAlloc
HeapQueryInformation
GetFileSizeEx
GetStringTypeW
IsValidCodePage
GetCommandLineA
GetACP
GetStdHandle
SetFilePointerEx
GetConsoleOutputCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlushFileBuffers
GetCPInfo
GetFullPathNameW
DeleteFileW
GetFileAttributesW
SetFileAttributesW
CreateFileW
FindClose
FindFirstFileW
FindNextFileW
GetDriveTypeW
WriteFile
GetTempPathW
CloseHandle
Sleep
WaitForMultipleObjects
CreateThread
GetSystemDirectoryW
FreeResource
GetModuleFileNameA
GetModuleHandleW
LoadResource
LockResource
SizeofResource
FindResourceW
GlobalAlloc
GlobalUnlock
GlobalLock
WinExec
GetConsoleWindow
LocalFree
FormatMessageA
GetLocaleInfoEx
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
FindFirstFileExW
GetDiskFreeSpaceExW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
RtlUnwind
SetFileInformationByHandle
SetFileTime
AreFileApisANSI
GetLastError
DeviceIoControl
GetProcAddress
CreateDirectoryExW
CopyFileW
MoveFileExW
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
GetCurrentThreadId
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
ReadConsoleW
RtlPcToFileHeader
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetFileType
SetEndOfFile
ReadFile
GetConsoleMode
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 273KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 373B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7.4MB - Virtual size: 7.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ