Static task
static1
Behavioral task
behavioral1
Sample
LaunchWinApp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
LaunchWinApp.exe
Resource
win10v2004-20230220-en
General
-
Target
LaunchWinApp.exe
-
Size
32KB
-
MD5
9105fb6117126e3bcd74cddffbabd260
-
SHA1
03cd294072d472ba044aa6ebacfb5ebcfb3c5bee
-
SHA256
3470a56ef95da2974cb330fca91b58ac78f40e4cc9128f517840941f2de8f994
-
SHA512
9e50853d451b2a7fdb058b3e3d08f4ce51f3681b28cd2aa5d96aa2b2c47811a37e91a97693a88a0e034fd596d853c6e502e1bd617bb6ef12efbceeac1d5ecb72
-
SSDEEP
768:XK4tlUw2ZbNUYq+KGEz9Znt2l6d5GMmj2mZJyt0:6o+w2LfwnzGVJyt0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource LaunchWinApp.exe
Files
-
LaunchWinApp.exe.exe windows x86
dc2b1716cffbc8111a0ff83c20ca0ac4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
EventSetInformation
EventRegister
EventWriteTransfer
EventUnregister
kernel32
GetModuleFileNameA
InitOnceBeginInitialize
CreateSemaphoreExW
HeapFree
SetLastError
GetCommandLineW
GetCurrentProcess
ReleaseSemaphore
GetModuleHandleExW
K32GetModuleFileNameExW
WaitForSingleObject
GetCurrentThreadId
ReleaseMutex
K32EnumProcessModulesEx
OpenProcess
FormatMessageW
GetLastError
OutputDebugStringW
InitOnceComplete
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
HeapAlloc
GetProcAddress
CreateMutexExW
LocalFree
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
DebugBreak
IsDebuggerPresent
msvcrt
__dllonexit
_unlock
_purecall
_onexit
??1type_info@@UAE@XZ
memmove
_lock
?terminate@@YAXXZ
memcpy_s
_wcmdln
_initterm
_except_handler4_common
__p__fmode
_cexit
_exit
exit
__set_app_type
??3@YAXPAX@Z
_amsg_exit
__p__commode
_vsnwprintf
_XcptFilter
_vsnprintf_s
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
__setusermatherr
_controlfp
memcpy
_CxxThrowException
__CxxFrameHandler3
__wgetmainargs
malloc
_callnewh
??0exception@@QAE@ABQBD@Z
??0exception@@QAE@ABQBDH@Z
?what@exception@@UBEPBDXZ
memset
api-ms-win-core-shlwapi-legacy-l1-1-0
PathFindExtensionW
api-ms-win-core-com-l1-1-0
CoCreateFreeThreadedMarshaler
api-ms-win-core-winrt-l1-1-0
RoUninitialize
RoInitialize
oleaut32
SysFreeString
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-processthreads-l1-1-0
TerminateProcess
GetStartupInfoW
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetSystemTimeAsFileTime
iertutil
CreateUri
ntdll
NtQueryInformationProcess
shell32
CommandLineToArgvW
ShellExecuteExW
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ