Static task
static1
Behavioral task
behavioral1
Sample
a98577b632bf0c7f52e0ad630deb142f025548e11742c722edfc1aa7e451307fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a98577b632bf0c7f52e0ad630deb142f025548e11742c722edfc1aa7e451307fN.exe
Resource
win10v2004-20250207-en
General
-
Target
a98577b632bf0c7f52e0ad630deb142f025548e11742c722edfc1aa7e451307fN.exe
-
Size
863KB
-
MD5
3b04620c595f056953d8a69f7df50890
-
SHA1
a081df0cb394ef9b7d7d36e9df30a35d56d326dd
-
SHA256
a98577b632bf0c7f52e0ad630deb142f025548e11742c722edfc1aa7e451307f
-
SHA512
50be59e6d82590d47fa0eb3e95d4493b59576ec21c821ee6cf4d671687f38767e6d24b97df87c60197d014ce412a9c95c68e9938715485a88080514db4912bda
-
SSDEEP
6144:aLghm3ma0IcIIY9Y3urjY0MxecINPBPSsHo0wlTyXc4t+/qemoNNozPs:akh0marcc9RANINPB9oeMhq0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a98577b632bf0c7f52e0ad630deb142f025548e11742c722edfc1aa7e451307fN.exe
Files
-
a98577b632bf0c7f52e0ad630deb142f025548e11742c722edfc1aa7e451307fN.exe.exe windows:5 windows x86 arch:x86
48a9355154f0fa6283e9dc153fb55f95
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GlobalGetAtomNameA
GlobalGetAtomNameW
GlobalLock
GlobalMemoryStatus
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LockResource
MapViewOfFile
MoveFileW
MultiByteToWideChar
OpenMutexA
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
ReadProcessMemory
ReleaseMutex
ResumeThread
GlobalDeleteAtom
SetEndOfFile
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFilePointer
SetFilePointerEx
SetHandleCount
SetLastError
SetPriorityClass
SetStdHandle
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualFree
VirtualProtect
VirtualProtectEx
VirtualQueryEx
WaitForDebugEvent
WaitForMultipleObjects
WaitForMultipleObjectsEx
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
WriteProcessMemory
lstrcatW
lstrcmpW
lstrcpyW
lstrlenW
GlobalAlloc
GlobalAddAtomW
GlobalAddAtomA
GetVersionExA
GetUserDefaultLCID
GetTimeZoneInformation
GetTimeFormatW
GetTickCount
GetThreadContext
GetSystemTimeAsFileTime
GetSystemTime
GetSystemInfo
GetStringTypeW
GetStringTypeA
GetStdHandle
GetStartupInfoW
GetStartupInfoA
GetShortPathNameW
GetShortPathNameA
GetProcessHeap
GetOEMCP
GetModuleHandleW
GetModuleHandleExW
GetModuleFileNameW
GetModuleFileNameA
GetLocaleInfoW
CreateFileA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFileType
GetFileSize
GetFileAttributesW
GetExitCodeProcess
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetConsoleOutputCP
GetConsoleMode
GetConsoleCP
GetComputerNameA
GetCommandLineW
GetCommandLineA
GetCPInfo
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FreeConsole
FormatMessageW
FlushFileBuffers
FindResourceW
FindNextFileW
FindFirstFileW
FindFirstFileA
FindClose
ExpandEnvironmentStringsW
ExitThread
ExitProcess
EnumSystemLocalesW
EnterCriticalSection
EncodePointer
DuplicateHandle
DeleteFileW
DeleteCriticalSection
DecodePointer
DebugActiveProcess
CreateThread
CreateProcessW
CreateProcessA
CreateMutexA
CreateFileW
CreateFileMappingA
CreateEventW
CreateDirectoryW
CreateDirectoryA
ContinueDebugEvent
CompareStringW
CompareFileTime
CloseHandle
GetModuleHandleA
LoadLibraryA
GetProcAddress
RtlUnwind
user32
ModifyMenuA
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
PeekMessageA
PostMessageA
PostQuitMessage
PtInRect
RedrawWindow
RegisterClassExA
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageA
SetCapture
SetCursor
SetFocus
SetForegroundWindow
SetMenu
SetParent
SetRect
SetRectEmpty
SetScrollInfo
SetScrollPos
SetShellWindow
SetTimer
SetWindowLongA
SetWindowPos
SetWindowRgn
SetWindowTextA
ShowWindow
SystemParametersInfoA
TabbedTextOutA
TranslateMessage
UnionRect
WindowFromPoint
IsWindowVisible
IsWindow
IsRectEmpty
IsMenu
IsIconic
IsChild
IsCharAlphaW
InvalidateRect
InflateRect
GrayStringA
GetWindowTextA
GetWindowRect
GetWindowLongA
GetWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSysColor
GetSubMenu
GetNextDlgTabItem
GetNextDlgGroupItem
GetMenuStringA
GetMenuState
GetMenuItemInfoA
MessageBoxExW
GetMenuItemCount
GetKeyState
GetIconInfo
GetDlgCtrlID
GetDesktopWindow
GetCursorPos
GetClientRect
GetCapture
GetAltTabInfoW
GetActiveWindow
FrameRect
FindWindowA
FillRect
EnumChildWindows
EndPaint
EnableWindow
DrawTextA
DrawStateA
DrawIconEx
DrawIcon
DrawFrameControl
DrawFocusRect
DrawEdge
DestroyWindow
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcA
DdeFreeDataHandle
CreateWindowExA
CreateIconIndirect
CountClipboardFormats
CopyRect
ClientToScreen
CharUpperA
CharToOemBuffA
CharLowerA
CallWindowProcA
BeginPaint
AppendMenuA
LoadIconW
CreatePopupMenu
GetAsyncKeyState
IsCharLowerW
GetClipboardViewer
CreateMenu
GetWindowTextLengthW
EndMenu
CharLowerW
GetDC
GetTopWindow
VkKeyScanW
GetClipboardOwner
GetProcessWindowStation
GetMessageExtraInfo
GetMenuContextHelpId
IsCharUpperW
DestroyMenu
LoadCursorFromFileA
LoadCursorFromFileW
IsWindowEnabled
GetParent
LockSetForegroundWindow
LoadMenuA
LoadImageA
LoadIconA
LoadCursorA
LoadBitmapA
GetMenuItemID
KillTimer
GetMessageTime
CallWindowProcW
gdi32
GdiEntry13
GdiGetDevmodeForPage
GdiPlayDCScript
GdiProcessSetup
GdiValidateHandle
GetCharWidthFloatW
GetHFONT
GetKerningPairs
GetMetaFileA
GetMetaRgn
GetStockObject
GetTextExtentExPointA
GetTextExtentExPointI
GetTextExtentPoint32W
GetTextFaceA
GdiDescribePixelFormat
PATHOBJ_vEnumStartClipLines
RoundRect
STROBJ_bEnumPositionsOnly
STROBJ_vEnumStart
SelectBrushLocal
SelectObject
SetBkColor
SetBkMode
SetDCPenColor
SetDIBColorTable
SetTextColor
SetViewportOrgEx
SwapBuffers
XLATEOBJ_piVector
GdiConvertToDevmodeW
GdiConvertDC
GdiComment
GdiArtificialDecrementDriver
FONTOBJ_cGetGlyphs
EngGradientFill
EngFillPath
EngCreateBitmap
EngCheckAbort
Ellipse
CreatePolyPolygonRgn
CreatePen
CreateFontW
CreateDIBSection
CreateCompatibleBitmap
CreateBitmapIndirect
CopyMetaFileA
ColorMatchToTarget
CLIPOBJ_bEnum
AddFontResourceTracking
AddFontResourceA
GetEnhMetaFileW
UnrealizeObject
CreateSolidBrush
FillPath
WidenPath
EndPage
LineTo
AddFontResourceW
advapi32
RegDeleteValueW
StartServiceCtrlDispatcherW
SetServiceStatus
ReportEventW
RegisterServiceCtrlHandlerW
RegisterEventSourceW
RegSetValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegEnumValueW
RegEnumKeyExW
RegOpenKeyW
RegDeleteKeyW
RegCreateKeyW
RegCreateKeyExW
RegCreateKeyExA
RegCloseKey
OpenServiceW
OpenSCManagerW
LookupAccountNameW
GetUserNameW
ControlService
CloseServiceHandle
RegQueryValueExW
shell32
SHGetFolderPathW
SHGetDataFromIDListW
SHGetDesktopFolder
SHGetPathFromIDListA
shlwapi
PathAppendW
StrStrIW
comctl32
InitCommonControlsEx
msvcrt
_XcptFilter
__getmainargs
__p___initenv
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_abnormal_termination
_adjust_fdiv
_controlfp
_except_handler3
_exit
_initterm
_itoa
_local_unwind2
_tzset
atol
bsearch
exit
memchr
memmove
printf
qsort
rand
sprintf
srand
sscanf
strchr
strncmp
strrchr
time
wcscmp
wcscpy
wcslen
wcstombs
Sections
.text Size: 249KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 579KB - Virtual size: 578KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ