Static task
static1
Behavioral task
behavioral1
Sample
fcc621e1c986156faa0ec440a7b8a99bc9af83ad000d2518bfab2753c0c23852.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fcc621e1c986156faa0ec440a7b8a99bc9af83ad000d2518bfab2753c0c23852.exe
Resource
win10v2004-20241007-en
General
-
Target
fcc621e1c986156faa0ec440a7b8a99bc9af83ad000d2518bfab2753c0c23852
-
Size
492KB
-
MD5
1caf80fc26a7a702124409669aeee1d3
-
SHA1
ed1deecd7173a4a30c182d4169fc9f573e4b4088
-
SHA256
fcc621e1c986156faa0ec440a7b8a99bc9af83ad000d2518bfab2753c0c23852
-
SHA512
9df72a3f5836088e65e19dbe164de71acc6177fa4d891a2dc69812c04aff7d23dde348c6f80c1f14878006eb9958c4ff7715dd8fdf01f1b8b6b637bb52ee1a02
-
SSDEEP
6144:wCi7Sfg/tJYkWLlcKTqPmBm1rElA+ycSKu7dfh+KrD:wC6/QxTqPImNYtvu7R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fcc621e1c986156faa0ec440a7b8a99bc9af83ad000d2518bfab2753c0c23852
Files
-
fcc621e1c986156faa0ec440a7b8a99bc9af83ad000d2518bfab2753c0c23852.exe windows:6 windows x64 arch:x64
6a85b58cd1aebe71524a2d8f76ab54f7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentProcessId
CreateProcessW
WideCharToMultiByte
VirtualQuery
CreateEventW
SetEvent
ResetEvent
FileTimeToSystemTime
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
lstrcmpiW
LoadLibraryExW
SetEndOfFile
WriteConsoleW
CreateFileW
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
CloseHandle
LCMapStringW
ReadConsoleW
GetConsoleMode
GetConsoleCP
GetFileType
SetFilePointerEx
WriteFile
GetStdHandle
GetCommandLineA
GetModuleHandleExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlPcToFileHeader
RtlUnwindEx
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
GlobalFlags
MultiByteToWideChar
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetLastError
ReadFile
GetSystemInfo
FreeLibrary
GetProcAddress
LoadLibraryW
GetTickCount
ExitProcess
FindResourceW
LoadResource
LockResource
FreeResource
SizeofResource
MulDiv
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
LeaveCriticalSection
GetCurrentThreadId
GetModuleHandleW
IsDebuggerPresent
GetFileAttributesW
FindClose
FindFirstFileW
GetTempPathW
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
user32
GetSysColor
GetDlgItem
SetWindowLongPtrW
RegisterClassExW
PostQuitMessage
GetClassInfoExW
CharNextW
wsprintfW
FillRect
DestroyAcceleratorTable
SetFocus
TranslateAcceleratorW
CallWindowProcW
EndPaint
GetNextDlgTabItem
BeginPaint
IsIconic
DeleteMenu
GetClassNameW
IntersectRect
UnregisterClassW
MessageBoxW
GetWindowLongW
SendMessageW
SetWindowPos
SetWindowLongW
InvalidateRect
GetWindowTextW
GetWindowTextLengthW
DestroyWindow
IsWindow
IsRectEmpty
WinHelpW
SetMenu
IsWindowEnabled
IsChild
GetDlgCtrlID
IsDialogMessageW
DrawIcon
SetWindowRgn
IsWindowVisible
GetFocus
GetSystemMenu
GetLastActivePopup
PtInRect
SetParent
ClientToScreen
RedrawWindow
OffsetRect
ScreenToClient
KillTimer
SetRect
MessageBeep
IsZoomed
GetTopWindow
DestroyIcon
DestroyMenu
GetWindowThreadProcessId
MonitorFromWindow
SetActiveWindow
WaitForInputIdle
DefWindowProcW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
SetWindowTextW
ShowWindow
EnableWindow
GetKeyState
SetCursor
GetWindow
AdjustWindowRectEx
ReleaseDC
GetClientRect
GetWindowDC
GetSystemMetrics
GetDC
GetWindowRect
LoadImageW
GetParent
GetDesktopWindow
LoadCursorW
LoadIconW
SetTimer
GetActiveWindow
GetMonitorInfoW
MoveWindow
EnumWindows
EnumDisplaySettingsW
PostMessageW
CreateWindowExW
GetWindowLongPtrW
LoadStringW
gdi32
CreateSolidBrush
SetBkColor
SetTextColor
CreateEllipticRgn
CreateRoundRectRgn
GetClipBox
ExcludeClipRect
GetTextMetricsW
SelectObject
CreateDIBSection
SetDIBColorTable
CreateCompatibleDC
GdiAlphaBlend
StretchBlt
GetStockObject
GetDeviceCaps
DeleteDC
GetObjectW
SetStretchBltMode
CreateFontIndirectW
DeleteObject
advapi32
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegDeleteValueW
RegCloseKey
shell32
DragAcceptFiles
DragFinish
DragQueryFileW
Shell_NotifyIconW
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoInitializeEx
CoUninitialize
CreateStreamOnHGlobal
oleaut32
VarUI4FromStr
SystemTimeToVariantTime
VariantTimeToSystemTime
comctl32
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControlsEx
ws2_32
WSACleanup
gdiplus
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipAlloc
GdipDrawImageRectI
GdipDisposeImage
GdipGetImagePixelFormat
GdipFree
GdipGetImagePaletteSize
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipGetImagePalette
GdipSetCompositingMode
GdipGetImageWidth
GdipCreateBitmapFromFile
GdipCreateBitmapFromScan0
GdipCloneImage
GdipGetImageHeight
GdiplusStartup
GdiplusShutdown
GdipBitmapLockBits
Sections
.text Size: 311KB - Virtual size: 310KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ