Static task
static1
Behavioral task
behavioral1
Sample
28d35a608ff2313c4b4b0bd7861673f198c4d75a2b3b50c015f2213ee3de1a74.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
28d35a608ff2313c4b4b0bd7861673f198c4d75a2b3b50c015f2213ee3de1a74.exe
Resource
win10v2004-20230220-en
General
-
Target
28d35a608ff2313c4b4b0bd7861673f198c4d75a2b3b50c015f2213ee3de1a74
-
Size
316KB
-
MD5
ccfacd2af0d57e62e6c3982f36672898
-
SHA1
ce9807fe03c3aecf8b5840e9b8af438d0f1f7232
-
SHA256
28d35a608ff2313c4b4b0bd7861673f198c4d75a2b3b50c015f2213ee3de1a74
-
SHA512
ca6c6165bd7591e2ea446145dae8a81f299762445bd62a80be56077466e9147a0ff5bca239f96182ef4c301770b19a6f47179f763c400b33fa8c0f28bd9b6d63
-
SSDEEP
3072:R0KNzZeL2QKoDQj771CboqtcL2fOti/OMfxcouJhLZo0hSHPEo3X:1ZdRjNCJcaWti/OMfxcocfThIX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28d35a608ff2313c4b4b0bd7861673f198c4d75a2b3b50c015f2213ee3de1a74
Files
-
28d35a608ff2313c4b4b0bd7861673f198c4d75a2b3b50c015f2213ee3de1a74.exe windows x86
6d043053d59001058b8726e4fa2effe0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCommTimeouts
PurgeComm
SetupComm
SetCommMask
CreateEventA
Sleep
EscapeCommFunction
ClearCommError
GetOverlappedResult
GetLastError
WaitCommEvent
WriteFile
lstrlenA
DeviceIoControl
GetCurrentDirectoryA
SetCurrentDirectoryA
SetFilePointer
GetLocalTime
GetLocaleInfoW
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCommState
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
SetStdHandle
GetStringTypeW
GetStringTypeA
SetConsoleCtrlHandler
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetCurrentProcessId
GetFileAttributesA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetFileType
SetHandleCount
FlushFileBuffers
HeapCreate
HeapDestroy
GetVersionExA
SetCommState
CreateFileA
GetFileSize
CloseHandle
ReadFile
lstrcpyA
SetEndOfFile
lstrcatA
GetEnvironmentVariableA
VirtualAlloc
VirtualFree
HeapFree
HeapReAlloc
HeapAlloc
FatalAppExitA
LeaveCriticalSection
ResumeThread
CreateThread
TlsSetValue
TlsGetValue
ExitThread
IsBadWritePtr
IsBadReadPtr
HeapValidate
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
GetTimeZoneInformation
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
DebugBreak
GetStdHandle
OutputDebugStringA
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetCurrentThreadId
TlsAlloc
TlsFree
SetLastError
GetCurrentThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
RtlUnwind
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
DeleteFileA
user32
LoadIconA
DestroyWindow
GetSysColor
SetFocus
EnableWindow
GetDlgCtrlID
GetWindowTextA
SetTimer
KillTimer
PostQuitMessage
MoveWindow
DefWindowProcA
CreateWindowExA
SetWindowTextA
ShowWindow
UpdateWindow
LoadAcceleratorsA
LoadCursorA
RegisterClassA
GetMessageA
TranslateAcceleratorA
IsDialogMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
CreateDialogParamA
MessageBoxA
CheckRadioButton
EndDialog
GetDlgItem
SendMessageA
gdi32
SetTextColor
SetBkMode
DeleteObject
GetStockObject
GetObjectA
CreateFontIndirectA
CreateSolidBrush
comdlg32
GetOpenFileNameA
GetSaveFileNameA
setupapi
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
Sections
.text Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE