Static task
static1
Behavioral task
behavioral1
Sample
7428aa093ee4c026c592001a93243db173e6c244a6472e3dbdd3232f4a9978ab.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7428aa093ee4c026c592001a93243db173e6c244a6472e3dbdd3232f4a9978ab.exe
Resource
win10v2004-20230220-en
General
-
Target
7428aa093ee4c026c592001a93243db173e6c244a6472e3dbdd3232f4a9978ab
-
Size
4.4MB
-
MD5
e023d1397775083a99424ac3a03e5682
-
SHA1
1a8989dad6eb518a58fe2fa3ebe424e7d677cf6a
-
SHA256
7428aa093ee4c026c592001a93243db173e6c244a6472e3dbdd3232f4a9978ab
-
SHA512
0aa7cd6030a888ad5bf7c950278f2e4242e888f1192fad169e958c31ae3953eac975409f732d719a8508f8147587132aec214edd86a6ac8b2055115b1dbaf2e5
-
SSDEEP
6144:HiPlmU00hyVI/vIeXOyLk4UoPLGYm63dfohVS8n7Q:Cdm/wyVaQeDk4ZLXn3dfol
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7428aa093ee4c026c592001a93243db173e6c244a6472e3dbdd3232f4a9978ab
Files
-
7428aa093ee4c026c592001a93243db173e6c244a6472e3dbdd3232f4a9978ab.exe windows x64
45b92c52a2a3cebc98207f7db8fe7101
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
OpenProcess
CreateToolhelp32Snapshot
FormatMessageW
GetLastError
UpdateProcThreadAttribute
Process32NextW
CreateFileW
CloseHandle
HeapAlloc
LocalFree
GetProcessHeap
CreateProcessW
WideCharToMultiByte
HeapSize
LocalAlloc
InitializeProcThreadAttributeList
Process32FirstW
SetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RtlUnwind
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
GetCommandLineA
GetCommandLineW
HeapFree
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
WriteConsoleW
advapi32
OpenProcessToken
GetTokenInformation
GetSidSubAuthority
Sections
.text Size: 177KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ