Static task
static1
Behavioral task
behavioral1
Sample
18f8334540eb090725207eec2594c9c4e0975cad1faf7f04672d3bb7e4eee52c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
18f8334540eb090725207eec2594c9c4e0975cad1faf7f04672d3bb7e4eee52c.exe
Resource
win10v2004-20241007-en
General
-
Target
18f8334540eb090725207eec2594c9c4e0975cad1faf7f04672d3bb7e4eee52c
-
Size
3.7MB
-
MD5
67a48e919b9ac734152c15c5d9f1f988
-
SHA1
325b3b8728bbe02c8470d7c70512acb31244f13d
-
SHA256
18f8334540eb090725207eec2594c9c4e0975cad1faf7f04672d3bb7e4eee52c
-
SHA512
ac070a9fa8af30dbe0159f74ee6fdc9e79e6009fb113d07f204411b941e1ef8fe1f34a8b0ed2190d5a9618c31978b708e25f294bb89da727c8dc000c31b4d4b6
-
SSDEEP
49152:hFDgM6ajc72cNfJIgBkadhapK/FqBC2xRu/FFyywgKpxG0rv:bMag7ZJJLRhayFe/m//yywgKpxG0rv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18f8334540eb090725207eec2594c9c4e0975cad1faf7f04672d3bb7e4eee52c
Files
-
18f8334540eb090725207eec2594c9c4e0975cad1faf7f04672d3bb7e4eee52c.exe windows:5 windows x86 arch:x86
dcec129ff77f691969396c800e86cea2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
PropertySheetW
InitCommonControlsEx
ImageList_Write
ImageList_SetImageCount
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Remove
ImageList_Read
ImageList_GetImageCount
ImageList_GetIconSize
ImageList_EndDrag
ImageList_Draw
ImageList_Destroy
ImageList_Create
ImageList_Copy
ImageList_BeginDrag
version
GetFileVersionInfoSizeA
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
kernel32
CreateSemaphoreW
CreateThread
DeleteCriticalSection
DeleteFileW
DeviceIoControl
DuplicateHandle
EnumResourceNamesW
EnumSystemLocalesA
ExitProcess
ExitThread
FileTimeToSystemTime
FindCloseChangeNotification
FindFirstChangeNotificationW
FindFirstFileW
FindNextChangeNotification
FindNextFileW
FindResourceExW
FindResourceW
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetCPInfo
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDateFormatW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetDriveTypeW
GetEnvironmentStringsW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFullPathNameW
GetHandleInformation
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetLocalTime
GetLogicalDrives
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetNumberFormatW
GetOEMCP
GetOverlappedResult
GetPriorityClass
GetPrivateProfileStringW
GetPrivateProfileStructW
GetProcAddress
GetProcessHeap
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempPathW
GetThreadContext
GetTimeFormatA
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
CreateProcessW
GetVersionExW
GetVolumeInformationW
GetWindowsDirectoryW
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringW
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFree
LockResource
lstrcmpA
lstrcmpiW
lstrcmpW
lstrlenA
lstrlenW
MapViewOfFile
MoveFileExW
MulDiv
MultiByteToWideChar
OpenEventA
OpenEventW
OpenMutexW
OpenProcess
OutputDebugStringA
QueryDosDeviceW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReadProcessMemory
ReleaseSemaphore
RemoveDirectoryW
ResetEvent
ResumeThread
SetConsoleTextAttribute
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetEvent
SetFileTime
SetHandleCount
SetLastError
SetNamedPipeHandleState
SetPriorityClass
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TransactNamedPipe
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
WaitForMultipleObjectsEx
WaitForSingleObjectEx
WaitNamedPipeW
WideCharToMultiByte
WriteConsoleW
WriteFile
WritePrivateProfileStringW
WritePrivateProfileStructW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
RtlUnwind
CreatePipe
CreateMutexW
CreateFileW
CreateFileMappingW
CreateFileA
CreateEventW
GetStartupInfoW
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
LoadLibraryA
GetFileType
GetStringTypeA
LCMapStringA
GetVersionExA
user32
LoadCursorW
KillTimer
LoadAcceleratorsW
LoadBitmapW
IsWindowVisible
GetKeyState
IsWindowEnabled
LoadIconW
LoadImageW
LoadMenuW
LoadStringW
MapWindowPoints
MessageBoxW
MessageBoxA
IsZoomed
winspool.drv
StartPagePrinter
comdlg32
CommDlgExtendedError
advapi32
OpenServiceW
StartServiceW
SetSecurityDescriptorDacl
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
QueryServiceStatus
GetUserNameW
InitializeSecurityDescriptor
InitiateSystemShutdownW
LookupPrivilegeValueW
OpenSCManagerW
OpenProcessToken
shell32
ShellExecuteExW
ShellExecuteW
ole32
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoTaskMemRealloc
CreateStreamOnHGlobal
shlwapi
PathRemoveExtensionW
PathMatchSpecW
PathIsDirectoryW
PathRemoveFileSpecW
PathFileExistsW
PathCombineW
PathAppendW
PathAddExtensionW
PathIsUNCA
PathFindFileNameA
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ