Static task
static1
Behavioral task
behavioral1
Sample
086d569820100e59cb3709bb6c5ea5b1026861c52ff05c7d9afad992885f790fN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
086d569820100e59cb3709bb6c5ea5b1026861c52ff05c7d9afad992885f790fN.exe
Resource
win10v2004-20241007-en
General
-
Target
086d569820100e59cb3709bb6c5ea5b1026861c52ff05c7d9afad992885f790fN
-
Size
144KB
-
MD5
79e36707abf82183a03e9d8dda3b3430
-
SHA1
d986b8ba3ed36333f127b34842fc991713c4f5ac
-
SHA256
086d569820100e59cb3709bb6c5ea5b1026861c52ff05c7d9afad992885f790f
-
SHA512
26f0b48f09193014bd9fc5f1ede8df23979e4791ae47e6d4395656fa62d22a32435f43aba15e3f32facb4fdc24f2ed97305bebf1eb53bc5033bae82710e88b4d
-
SSDEEP
3072:uaVP6HaGT5SR8fGzIpYDx1cTqO9lkS2jbxWGqSV3:uaGoEpWxSbGqSV3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 086d569820100e59cb3709bb6c5ea5b1026861c52ff05c7d9afad992885f790fN
Files
-
086d569820100e59cb3709bb6c5ea5b1026861c52ff05c7d9afad992885f790fN.exe windows:5 windows x86 arch:x86
8819ab09512a5d10306139f9395559e5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFindAtomA
GlobalMemoryStatusEx
GlobalWire
Heap32First
Module32NextW
OpenEventW
ReadConsoleOutputCharacterW
ReleaseMutex
SetTapePosition
SetVolumeMountPointA
SignalObjectAndWait
TlsFree
Toolhelp32ReadProcessMemory
TransactNamedPipe
GetUserDefaultLCID
UnlockFile
VirtualFree
VirtualLock
WaitForSingleObject
WideCharToMultiByte
_lcreat
lstrcatW
lstrcmpA
lstrcmpW
lstrcpynA
VirtualAlloc
GetStartupInfoA
CreateFileW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetLastError
GetFileInformationByHandle
GetFileAttributesExW
GetEnvironmentStringsW
GetDiskFreeSpaceW
GetCurrentProcessId
GetConsoleAliasExesLengthA
FlushConsoleInputBuffer
FindFirstVolumeMountPointA
EnumSystemLocalesW
EnumSystemLanguageGroupsA
EnumCalendarInfoA
DosDateTimeToFileTime
DisableThreadLibraryCalls
AddConsoleAliasA
CreateHardLinkA
CreateDirectoryExW
CopyFileExA
ChangeTimerQueueTimer
AssignProcessToJobObject
TransmitCommChar
user32
CheckRadioButton
CharPrevA
CascadeChildWindows
CallMsgFilter
AppendMenuW
AdjustWindowRect
CloseDesktop
DdeGetData
DefFrameProcA
DialogBoxParamA
DispatchMessageW
DragDetect
DrawFrameControl
DrawStateA
DrawStateW
DrawTextW
GetAltTabInfoA
GetClassInfoExA
GetClipboardOwner
GetClipboardSequenceNumber
GetCursorInfo
GetDlgItem
GetLastActivePopup
LoadIconA
WINNLSEnableIME
UnregisterDeviceNotification
ToAsciiEx
SystemParametersInfoW
SwitchToThisWindow
SetWindowWord
SetWindowContextHelpId
SetCursor
SetCapture
SendMessageW
SendMessageCallbackW
ReleaseDC
MoveWindow
ModifyMenuW
ModifyMenuA
MenuItemFromPoint
IsCharLowerW
InvalidateRgn
GetScrollInfo
GetShellWindow
GetSysColorBrush
GetTabbedTextExtentW
GetWindowModuleFileNameA
GrayStringA
GetScrollBarInfo
InflateRect
comdlg32
ChooseFontW
CommDlgExtendedError
FindTextA
FindTextW
GetFileTitleW
GetOpenFileNameA
GetOpenFileNameW
GetSaveFileNameA
ChooseColorW
PageSetupDlgA
PageSetupDlgW
PrintDlgA
PrintDlgExA
PrintDlgExW
PrintDlgW
ReplaceTextA
ReplaceTextW
GetSaveFileNameW
GetFileTitleA
ChooseColorA
advapi32
RegOpenKeyW
shell32
SHCreateDirectoryExW
Shell_NotifyIconW
ShellExecuteW
ShellExecuteExA
ShellExecuteA
SHQueryRecycleBinA
SHPathPrepareForWriteA
SHLoadInProc
CheckEscapesW
DoEnvironmentSubstW
DragFinish
DragQueryFile
DragQueryFileW
DragQueryPoint
ExtractAssociatedIconA
ExtractAssociatedIconExA
ExtractAssociatedIconW
ExtractIconEx
ExtractIconExA
FindExecutableW
SHBrowseForFolder
SHBrowseForFolderA
SHBrowseForFolderW
SHIsFileAvailableOffline
SHEmptyRecycleBinA
SHEmptyRecycleBinW
SHFileOperation
SHGetDataFromIDListW
SHGetFileInfo
SHGetFolderLocation
SHGetIconOverlayIndexW
SHGetPathFromIDListA
SHGetPathFromIDListW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
WOWShellExecute
ole32
CoQueryAuthenticationServices
CoRegisterSurrogate
CoReleaseMarshalData
CoRevokeClassObject
CoSetProxyBlanket
CoUninitialize
CreateAntiMoniker
CreateDataAdviseHolder
CreateGenericComposite
GetHGlobalFromILockBytes
GetHGlobalFromStream
HBITMAP_UserFree
HBITMAP_UserMarshal
HENHMETAFILE_UserFree
HENHMETAFILE_UserMarshal
HICON_UserMarshal
HMENU_UserFree
HMETAFILE_UserMarshal
HPALETTE_UserMarshal
IsEqualGUID
OleCreateLinkToFileEx
OleCreateStaticFromData
OleIsCurrentClipboard
OleLockRunning
OleRegGetMiscStatus
OleSave
OleSaveToStream
OleSetMenuDescriptor
ProgIDFromCLSID
PropVariantCopy
ReleaseStgMedium
RevokeDragDrop
StgCreateStorageEx
StgOpenAsyncDocfileOnIFillLockBytes
StgOpenPropStg
StgOpenStorageEx
StgOpenStorageOnILockBytes
WriteOleStg
CoGetInterfaceAndReleaseStream
CoGetCurrentLogicalThreadId
CoCreateObjectInContext
CoCreateInstance
CLIPFORMAT_UserUnmarshal
CLIPFORMAT_UserMarshal
CLIPFORMAT_UserFree
CoGetInstanceFromIStorage
shlwapi
StrChrW
StrCmpNA
StrCmpNW
StrRStrIW
StrStrA
StrStrIA
StrStrW
Sections
.text17 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text16 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text44 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text14 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text13 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text12 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text11 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text10 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text9 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text8 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text7 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text6 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text5 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text4 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text3 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 1024B - Virtual size: 517B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ