Behavioral task
behavioral1
Sample
025b8ab849022495bba05df296c36324.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
025b8ab849022495bba05df296c36324.exe
Resource
win10v2004-20230221-en
General
-
Target
025b8ab849022495bba05df296c36324.exe
-
Size
461KB
-
MD5
025b8ab849022495bba05df296c36324
-
SHA1
97c184b5fb7333bcf4f461cfe3c4717973d2399c
-
SHA256
3b639f1284d130cce4e49977bff13e6424f5218b65a95a530ff6d9627837f2ae
-
SHA512
a75128ebcca09a5f0aa1da71359694542afdc299e55ef0b95bf1d211c44ca3530d93fce69ad9144a9937920f7659d7de6ce0855f1bb65c7bee752fa52058623e
-
SSDEEP
6144:sXVUvr+eNVx6JuGD5To83sRnymABKtqulRwOJfZJEfcZdC48hA6WsAOZZ8RX7mck:sX8/Vx65HCnDAByqulR1fZJQSs/Z8
Malware Config
Signatures
-
Remcos family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 025b8ab849022495bba05df296c36324.exe
Files
-
025b8ab849022495bba05df296c36324.exe.exe windows x86
b1c8f7572a6db205362528e88fd3ff32
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
ExpandEnvironmentStringsA
GetLongPathNameW
CopyFileW
GetLocaleInfoA
CreateToolhelp32Snapshot
OpenMutexA
Process32NextW
Process32FirstW
VirtualProtect
SetLastError
VirtualFree
VirtualAlloc
GetNativeSystemInfo
HeapAlloc
GetProcessHeap
FreeLibrary
IsBadReadPtr
GetTempPathW
OpenProcess
lstrcatW
GetCurrentProcessId
GetTempFileNameW
GetSystemDirectoryA
GlobalAlloc
GlobalLock
GetTickCount
GlobalUnlock
WriteProcessMemory
ResumeThread
GetThreadContext
ReadProcessMemory
CreateProcessW
SetThreadContext
LocalAlloc
GlobalFree
MulDiv
SizeofResource
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetStdHandle
SetFilePointer
FindResourceA
LockResource
LoadResource
LocalFree
SetConsoleOutputCP
FormatMessageA
AllocConsole
FindFirstFileA
lstrcpynA
QueryPerformanceFrequency
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapSize
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
HeapReAlloc
GetACP
GetModuleHandleExW
MoveFileExW
RtlUnwind
RaiseException
LoadLibraryExW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
GetFileSize
TerminateThread
GetLastError
GetModuleHandleA
RemoveDirectoryW
MoveFileW
SetFilePointerEx
GetLogicalDriveStringsA
DeleteFileW
CreateDirectoryW
DeleteFileA
SetFileAttributesW
GetFileAttributesW
FindClose
lstrlenA
GetDriveTypeA
FindNextFileW
GetFileSizeEx
FindFirstFileW
GetModuleHandleW
ExitProcess
CreateMutexA
GetCurrentProcess
GetProcAddress
LoadLibraryA
CreateProcessA
PeekNamedPipe
CreatePipe
TerminateProcess
ReadFile
HeapFree
HeapCreate
CreateEventA
GetLocalTime
CreateThread
SetEvent
CreateEventW
WaitForSingleObject
Sleep
GetModuleFileNameW
CloseHandle
ExitThread
CreateFileW
WriteFile
GetModuleFileNameA
TlsAlloc
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
DecodePointer
EncodePointer
WideCharToMultiByte
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
SetEndOfFile
user32
GetWindowTextW
wsprintfW
GetClipboardData
UnhookWindowsHookEx
GetForegroundWindow
ToUnicodeEx
GetKeyboardLayout
SetWindowsHookExA
CloseClipboard
OpenClipboard
GetKeyboardState
CallNextHookEx
GetKeyboardLayoutNameA
GetKeyState
GetWindowTextLengthW
GetWindowThreadProcessId
GetMessageA
SetClipboardData
EnumWindows
ExitWindowsEx
EmptyClipboard
ShowWindow
SetWindowTextW
MessageBoxW
IsWindowVisible
CloseWindow
SendInput
EnumDisplaySettingsW
mouse_event
CreatePopupMenu
DispatchMessageA
TranslateMessage
TrackPopupMenu
DefWindowProcA
CreateWindowExA
GetIconInfo
GetSystemMetrics
AppendMenuA
RegisterClassExA
GetCursorPos
SetForegroundWindow
DrawIcon
SystemParametersInfoW
gdi32
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
StretchBlt
GetDIBits
DeleteDC
DeleteObject
CreateDCA
GetObjectA
advapi32
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
GetUserNameW
RegEnumKeyExA
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
OpenSCManagerA
ControlService
StartServiceW
QueryServiceConfigW
ChangeServiceConfigW
OpenServiceW
EnumServicesStatusW
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyA
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExA
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegSetValueExA
RegOpenKeyExA
RegOpenKeyExW
RegCreateKeyW
RegDeleteValueW
RegEnumValueW
RegQueryValueExW
RegDeleteKeyA
shell32
ShellExecuteExA
Shell_NotifyIconA
ExtractIconA
ShellExecuteW
ole32
CoInitializeEx
CoUninitialize
CoGetObject
shlwapi
PathFileExistsW
PathFileExistsA
StrToIntA
winmm
waveInUnprepareHeader
waveInOpen
waveInStart
waveInAddBuffer
PlaySoundW
mciSendStringA
mciSendStringW
waveInClose
waveInStop
waveInPrepareHeader
ws2_32
gethostbyname
send
WSAStartup
closesocket
inet_ntoa
htons
htonl
getservbyname
ntohs
getservbyport
gethostbyaddr
inet_addr
WSASetLastError
WSAGetLastError
recv
connect
socket
urlmon
URLOpenBlockingStreamW
URLDownloadToFileW
gdiplus
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipGetImageEncoders
GdiplusStartup
GdipLoadImageFromStream
wininet
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
InternetReadFile
Sections
.text Size: 342KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 12B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 561B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ