Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20230220-en
General
-
Target
sample.exe.bin
-
Size
2.0MB
-
MD5
de62417f7c9ad6028cf3add86dba87a8
-
SHA1
e3814db10dd5253ab3911b65ecd1cd0e79067f70
-
SHA256
e5843e74da129da309ad2227b61e29d466cbc627766212f87e20ae1b35ec63f7
-
SHA512
3dde71a2bea9932ee1f3f27850465ac5235f2b4a441145f28ca62579c7b134f83020230361653b25262743aca3d845047fb184a352d103da08ed5501bed34e6b
-
SSDEEP
24576:5t8GRNogrQlXgeYL/hc75f8tZwBAMiaB/RsZ+Qn652iO7mSTmcwl/VIH06iyIlgH:5tnRV/hc75f8fwVByZ1gC1wzIU6ifM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource sample.exe.bin
Files
-
sample.exe.bin.exe windows x64
bac11c946d853a539a400d594f2b7b10
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
CopySid
OpenProcessToken
GetTokenInformation
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCreateKeyA
GetLengthSid
IsValidSid
LookupAccountSidW
ntdll
RtlVirtualUnwind
NtQuerySystemInformation
RtlUnwindEx
NtWriteFile
RtlNtStatusToDosError
RtlLookupFunctionEntry
NtReadFile
RtlCaptureContext
RtlGetVersion
NtQueryInformationProcess
RtlPcToFileHeader
kernel32
WakeConditionVariable
GetSystemInfo
ReleaseSRWLockExclusive
GetModuleHandleA
GetProcAddress
GetCurrentThread
TryAcquireSRWLockExclusive
GetStdHandle
GetConsoleMode
WaitForSingleObject
MultiByteToWideChar
WriteConsoleW
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
ReleaseMutex
GetEnvironmentVariableW
GetModuleHandleW
FormatMessageW
GetTempPathW
GetModuleFileNameW
HeapAlloc
GetFileInformationByHandle
GetFileInformationByHandleEx
GetFullPathNameW
SetFilePointerEx
CreateDirectoryW
FindFirstFileW
FindClose
SetThreadStackGuarantee
AddVectoredExceptionHandler
GetCurrentThreadId
CopyFileExW
SetLastError
InitializeSListHead
SetHandleInformation
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
TerminateProcess
GetLogicalDrives
SleepConditionVariableSRW
GetEnvironmentStringsW
SwitchToThread
CompareStringOrdinal
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
DuplicateHandle
CreateNamedPipeW
CreateThread
ReadFileEx
SleepEx
WriteFileEx
ExitProcess
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
GetCurrentDirectoryW
AcquireSRWLockShared
ReleaseSRWLockShared
WakeAllConditionVariable
AcquireSRWLockExclusive
LocalFree
GetProcessTimes
GetSystemTimes
GetProcessIoCounters
ReadProcessMemory
EncodePointer
OpenProcess
GetTickCount64
VirtualQueryEx
GetDriveTypeW
GetVolumeInformationW
GetDiskFreeSpaceExW
GlobalMemoryStatusEx
DeviceIoControl
GetCurrentProcessId
CreateFileA
HeapReAlloc
Sleep
WinExec
CloseHandle
GetLastError
GetCurrentProcess
HeapFree
RaiseException
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeEnvironmentStringsW
FreeLibrary
GetProcessHeap
CreateFileW
LoadLibraryExW
ole32
CoSetProxyBlanket
CoUninitialize
CoInitializeEx
CoCreateInstance
CoInitializeSecurity
iphlpapi
GetIfTable2
FreeMibTable
GetAdaptersAddresses
GetIfEntry2
netapi32
NetUserEnum
NetApiBufferFree
NetUserGetLocalGroups
NetUserGetInfo
secur32
LsaEnumerateLogonSessions
LsaFreeReturnBuffer
LsaGetLogonSessionData
pdh
PdhCloseQuery
PdhGetFormattedCounterValue
PdhRemoveCounter
PdhAddEnglishCounterW
PdhOpenQueryA
PdhCollectQueryData
user32
SetActiveWindow
SendInput
FindWindowA
ws2_32
freeaddrinfo
getaddrinfo
WSAGetLastError
WSAStartup
WSACleanup
WSASocketW
closesocket
getsockopt
setsockopt
recv
WSASend
getsockname
getpeername
ioctlsocket
send
connect
accept
select
bind
listen
WSARecv
shell32
CommandLineToArgvW
psapi
GetPerformanceInfo
GetModuleFileNameExW
oleaut32
VariantClear
SysFreeString
SysAllocString
powrprof
CallNtPowerInformation
api-ms-win-crt-heap-l1-1-0
calloc
free
_set_new_mode
malloc
api-ms-win-crt-string-l1-1-0
wcsncmp
wcslen
strcpy_s
api-ms-win-crt-runtime-l1-1-0
exit
_exit
_initterm
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_get_initial_narrow_environment
_set_app_type
_seh_filter_exe
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
abort
_initialize_narrow_environment
_configure_narrow_argv
_initterm_e
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 988KB - Virtual size: 988KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 980KB - Virtual size: 980KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ