Static task
static1
Behavioral task
behavioral1
Sample
91c8584cfea584eafc34c1cc68383e691aa190b5c6a85433236cce1fff96e4c5.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
91c8584cfea584eafc34c1cc68383e691aa190b5c6a85433236cce1fff96e4c5.exe
Resource
win10v2004-20241007-en
General
-
Target
91c8584cfea584eafc34c1cc68383e691aa190b5c6a85433236cce1fff96e4c5
-
Size
204KB
-
MD5
85db3282fe3af41e53d7bccf98349fb7
-
SHA1
8b394f238ab5adfa0e11d476482d2d0496c9af20
-
SHA256
91c8584cfea584eafc34c1cc68383e691aa190b5c6a85433236cce1fff96e4c5
-
SHA512
0da92335af0190c2ad635c93046ef68709551dbdc47eacd4df1fbfe2a54f8dd120ce8881cc3d9b76a7523bc9bf0f91b22d8a2406b206d084878385d7fbe347f0
-
SSDEEP
3072:65u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlAQ:6LexkuRaX41xoyJV65gzyZko+uc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 91c8584cfea584eafc34c1cc68383e691aa190b5c6a85433236cce1fff96e4c5
Files
-
91c8584cfea584eafc34c1cc68383e691aa190b5c6a85433236cce1fff96e4c5.exe windows:4 windows x86 arch:x86
add9e90fe8cc1a6d600a60e22be53bf7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
lstrcat
CompareFileTime
SetEvent
GetTempPathA
CopyFileExA
GlobalDeleteAtom
CopyFileA
LocalFree
CopyFileExW
ExitProcess
ExpandEnvironmentStringsA
LoadLibraryA
GetLogicalDriveStringsW
GetCommandLineA
IsValidLocale
SetPriorityClass
GetThreadPriority
GetWindowsDirectoryW
GetTempFileNameA
GetDateFormatA
SetThreadPriority
EnumCalendarInfoW
GetNumberFormatW
MultiByteToWideChar
OpenMutexW
GetFileAttributesW
GetSystemDefaultLCID
ExpandEnvironmentStringsW
GetProcAddress
GetLogicalDriveStringsA
lstrcpynW
GetLogicalDrives
GetCurrentDirectoryA
IsBadReadPtr
GetStringTypeA
user32
SetFocus
RegisterClassExW
SetTimer
CharLowerA
ShowWindow
MessageBoxW
CopyImage
LoadImageA
GetClassLongA
RegisterClassExA
PostMessageW
SetParent
GetDlgItemTextA
DefWindowProcA
GetClientRect
SendMessageW
DefFrameProcA
EnumDesktopsA
SetForegroundWindow
InvalidateRect
CheckDlgButton
LoadMenuIndirectA
GetWindowTextLengthA
SetWindowTextW
GetDC
LoadBitmapA
SendDlgItemMessageA
DefWindowProcW
SetDlgItemTextA
SendDlgItemMessageW
ChildWindowFromPoint
DestroyIcon
ArrangeIconicWindows
DrawTextA
CreateDialogIndirectParamA
DefDlgProcW
CharUpperA
CharPrevW
GetScrollPos
UpdateLayeredWindow
CallWindowProcA
GetDC
SetWindowRgn
gdi32
CreateRoundRectRgn
ResetDCW
Arc
CreatePen
CreateColorSpaceW
GetTextExtentPointA
GetPath
OffsetClipRgn
RectInRegion
advapi32
RegRestoreKeyW
RegDeleteKeyA
RegSaveKeyA
RegReplaceKeyW
RegReplaceKeyA
RegOpenKeyExA
RegFlushKey
shell32
SHCreateDirectoryExW
ShellExecuteExW
ExtractAssociatedIconExW
DuplicateIcon
SHGetDataFromIDListA
StrChrA
SHGetFileInfoA
StrChrIW
ExtractAssociatedIconA
shlwapi
UrlCombineA
PathMakeSystemFolderA
UrlUnescapeW
SHRegSetUSValueA
SHCreateThread
PathAppendA
PathCombineW
PathIsLFNFileSpecA
PathSetDlgItemPathW
StrToInt64ExA
SHCreateStreamOnFileW
StrCSpnIW
ColorRGBToHLS
SHRegGetBoolUSValueW
oleaut32
VarUI4FromUI1
VarIdiv
VarCyFromUI1
VarDateFromUI2
VarI8FromI2
VarR4CmpR8
VarNumFromParseNum
opengl32
glGetTexImage
glRectsv
crypt32
CryptSIPPutSignedDataMsg
CryptEnumKeyIdentifierProperties
Sections
.pGCC Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XJy Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.TvKn Size: 3KB - Virtual size: 472KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CA Size: 4KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 117KB - Virtual size: 327KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ylLMGt Size: 512B - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Z Size: 1KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 758B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ