Static task
static1
Behavioral task
behavioral1
Sample
47f5fd522c7383b1017973940dad73a544a0cf1694360c004705605a1df3914a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
47f5fd522c7383b1017973940dad73a544a0cf1694360c004705605a1df3914a.exe
Resource
win10v2004-20230220-en
General
-
Target
47f5fd522c7383b1017973940dad73a544a0cf1694360c004705605a1df3914a
-
Size
1.2MB
-
MD5
7a306ae1e582f40897e146ff600eb13a
-
SHA1
c84510bc06f19a7f8b05d3e5526c81d5d9e43369
-
SHA256
47f5fd522c7383b1017973940dad73a544a0cf1694360c004705605a1df3914a
-
SHA512
6fed94dba99c9f2f5a4819b76d3fc88fdfec8a07fcdde22543fe6140fda6eb6f159c5c65f2db113e13e10ec2a3c20ca23a2b7ae44dc5039671cc01b526b6a81b
-
SSDEEP
24576:yh+XzktZuYr8XMG972fc5wClGaT/SdSNx0rrF2KDxD1NwyHDiHp1o:htZZFuaT/SIdKD9XwyDiHp1o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47f5fd522c7383b1017973940dad73a544a0cf1694360c004705605a1df3914a
Files
-
47f5fd522c7383b1017973940dad73a544a0cf1694360c004705605a1df3914a.exe windows x86
4227dcfda2ec0f070ae6116f97c51a46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
psapi
GetProcessImageFileNameW
kernel32
HeapAlloc
GetProcAddress
LocalFree
GetProcessHeap
GetModuleHandleW
FreeLibrary
GetUserDefaultLangID
QueryDosDeviceW
GetEnvironmentVariableW
GetLogicalDriveStringsW
VirtualQuery
DeviceIoControl
LocalAlloc
GetSystemDirectoryW
FileTimeToSystemTime
FileTimeToLocalFileTime
SetThreadExecutionState
GetProcessTimes
GetDriveTypeW
OpenThread
TerminateThread
OutputDebugStringW
LoadLibraryW
MoveFileExW
FindClose
SystemTimeToTzSpecificLocalTime
GetPrivateProfileStringW
FindFirstFileW
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
lstrcmpiW
lstrcatW
WriteConsoleW
SetStdHandle
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
GetLastError
GetCurrentProcess
HeapFree
GetCurrentProcessId
GetLocalTime
GetCurrentThreadId
CreateFileW
SetFilePointer
GetModuleFileNameW
WriteFile
CloseHandle
OpenProcess
WaitForSingleObject
GetTickCount
WaitForMultipleObjects
HeapSize
DecodePointer
Sleep
CreateProcessW
GetTimeZoneInformation
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetVersionExW
LockResource
GetSystemInfo
LoadResource
FindResourceW
OpenEventW
CreateEventW
SetEvent
ResetEvent
GetComputerNameExW
GlobalAlloc
GlobalFree
CreateMutexW
ReleaseMutex
OpenMutexW
SearchPathW
ExpandEnvironmentStringsW
SwitchToThread
GetExitCodeProcess
GetLongPathNameW
GetShortPathNameW
GetFileAttributesExW
WideCharToMultiByte
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetACP
MultiByteToWideChar
GetVolumeInformationW
GetDiskFreeSpaceW
ResumeThread
GetFileAttributesW
LoadLibraryA
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
ReadFile
SetFileTime
SetEndOfFile
GetFileSize
GetFileTime
FindNextFileW
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
FileTimeToDosDateTime
LoadLibraryExW
CreateDirectoryW
GetFullPathNameW
lstrlenW
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
SetCurrentDirectoryW
CopyFileW
GetTempFileNameW
MoveFileW
InterlockedExchangeAdd
lstrcpyW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
FormatMessageW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetStdHandle
GetFileType
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
SetConsoleCtrlHandler
GetCurrentThread
GetStringTypeW
HeapReAlloc
user32
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
GetParent
GetWindowThreadProcessId
GetWindow
FindWindowExW
IsWindowVisible
OpenDesktopW
WindowFromPoint
CloseDesktop
ExitWindowsEx
FindWindowW
GetClassNameW
SwitchDesktop
GetDesktopWindow
GetSystemMetrics
advapi32
SystemFunction036
ReportEventW
RegisterEventSourceW
DeregisterEventSource
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
EqualSid
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
LookupPrivilegeNameW
SetNamedSecurityInfoW
OpenProcessToken
FreeSid
GetTokenInformation
RegisterServiceCtrlHandlerExW
SetServiceStatus
StartServiceCtrlDispatcherW
shell32
SHGetSpecialFolderPathW
ole32
CoInitializeSecurity
CoInitializeEx
rpcrt4
RpcServerListen
NdrServerCall2
NdrAsyncServerCall
RpcServerUseProtseqEpW
RpcServerRegisterIfEx
imagehlp
ImageRemoveCertificate
ImageEnumerateCertificates
Sections
.text Size: 885KB - Virtual size: 885KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msvcjmc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ