Static task
static1
Behavioral task
behavioral1
Sample
a994627cf542c5e6bce4dbedfd212b2476fe474257e3fd2e2a948d33df7b9fff.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a994627cf542c5e6bce4dbedfd212b2476fe474257e3fd2e2a948d33df7b9fff.exe
Resource
win10v2004-20230220-en
General
-
Target
a994627cf542c5e6bce4dbedfd212b2476fe474257e3fd2e2a948d33df7b9fff
-
Size
1.3MB
-
MD5
78a5d942e5855298e9d27953ad5788e9
-
SHA1
3da492a1ab51a0836b40755402f3b917699a2ff2
-
SHA256
a994627cf542c5e6bce4dbedfd212b2476fe474257e3fd2e2a948d33df7b9fff
-
SHA512
e0a16870db0aa837fdfaba5297e3cdda3d09376176c3ac2c1d516b7b3473e02486df502115d566061d697f755a6c2eb7d95b5841d66ac5d89fb57154a766fc2c
-
SSDEEP
24576:Uod6m6zMp0cC9L4SXx+PBAfaygnSLTxWFGQ:UoYmj0cC9L49ifa6LT4F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a994627cf542c5e6bce4dbedfd212b2476fe474257e3fd2e2a948d33df7b9fff
Files
-
a994627cf542c5e6bce4dbedfd212b2476fe474257e3fd2e2a948d33df7b9fff.exe windows x64
61c30b683a967faa369c27f119d47de1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
LoadLibraryW
GetCurrentThreadId
GetModuleHandleW
ExpandEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
GetPrivateProfileStringW
GetLastError
CloseHandle
GetVersionExW
FindResourceW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameW
LoadLibraryA
lstrlenW
lstrcatW
lstrcpyW
lstrcmpiW
CreateMutexW
ReleaseMutex
Sleep
HeapFree
OpenProcess
HeapAlloc
LocalFree
GetProcessHeap
LockResource
GetSystemInfo
LoadResource
LoadLibraryExW
FindFirstFileW
GetLongPathNameW
CreateFileW
GetFileAttributesW
GetEnvironmentVariableW
ReadFile
WriteFile
SetFilePointer
SetEndOfFile
DeleteFileW
GetFileSizeEx
WaitForMultipleObjects
GetCurrentProcessId
QueryDosDeviceW
GetCurrentProcess
FindNextFileW
FindClose
SetFileTime
GetFileSize
GetFileTime
CreateDirectoryW
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
GetCurrentDirectoryW
GetLogicalDriveStringsW
FormatMessageW
SetEvent
GetTickCount
SetLastError
GlobalMemoryStatusEx
RtlVirtualUnwind
GetTimeZoneInformation
FreeLibraryAndExitThread
ExitThread
SwitchToThread
DeviceIoControl
DecodePointer
ResetEvent
FreeLibrary
GetFileAttributesExW
GetProcAddress
CreateEventW
ResumeThread
FileTimeToSystemTime
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
RtlCaptureContext
RtlLookupFunctionEntry
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
GetACP
GetStringTypeW
GetFileType
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
OutputDebugStringW
WaitForSingleObjectEx
CreateThread
SetStdHandle
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
user32
SetWindowsHookExW
UnhookWindowsHookEx
MessageBoxW
SetDlgItemTextW
advapi32
RegCreateKeyExW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetFolderPathW
ole32
CoTaskMemFree
Sections
.text Size: 839KB - Virtual size: 839KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 281KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 143KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ