Static task
static1
Behavioral task
behavioral1
Sample
Process Explorer.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Process Explorer.exe
Resource
win10v2004-20230220-en
General
-
Target
Process Explorer.exe
-
Size
1.4MB
-
MD5
fc9128b1f368fff7957ed61b72655287
-
SHA1
19ac5c6aa4a1c28aae321f6cbd9cc74970c8e393
-
SHA256
07b1a57051c25e63116fdced6a50e84cd56aa56c517357d430a0d392fba00f2e
-
SHA512
8a815de1a76f55f570cae16ba0d5de23a6e4432e4bb1ccd2a361beef97597178209a2daa71caf26aa26cbe48b14bccc4df79a65657b905946141e1061e4b1094
-
SSDEEP
24576:oK8dbhH8s48SH3nc3zaBzz1pr+kAUX6hChg8EAtdP:oj5j/gXYWZz1gXUKTk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Process Explorer.exe
Files
-
Process Explorer.exe.exe windows x64
5661df91e0adea62bc4b6df68cc4048e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shlwapi
ColorHLSToRGB
ColorRGBToHLS
UrlUnescapeW
SHAutoComplete
ord176
iphlpapi
GetExtendedTcpTable
GetExtendedUdpTable
ws2_32
WSAStartup
ntohs
htonl
ntohl
htons
gethostbyaddr
getservbyport
mpr
WNetGetConnectionW
comctl32
ImageList_ReplaceIcon
ImageList_Add
InitCommonControlsEx
ImageList_Destroy
ImageList_DrawEx
ord17
PropertySheetW
ImageList_Create
CreateStatusWindowW
CreatePropertySheetPageW
ImageList_GetIcon
ord413
ord410
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
credui
CredUIPromptForCredentialsW
setupapi
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
crypt32
CryptDecodeObject
CertDuplicateCertificateContext
CertGetNameStringW
aclui
ord1
powrprof
SetSuspendState
IsPwrHibernateAllowed
IsPwrSuspendAllowed
wtsapi32
WTSFreeMemory
WTSDisconnectSession
WTSSendMessageW
WTSQuerySessionInformationW
WTSEnumerateSessionsW
WTSLogoffSession
uxtheme
EnableThemeDialogTexture
ntdll
RtlUnwind
NtQueryMutant
NtQueryEvent
NtQuerySection
NtQuerySymbolicLinkObject
NtQueryObject
NtOpenSymbolicLinkObject
NtQuerySystemInformation
NtSetInformationProcess
NtLoadDriver
NtCreateKey
NtOpenKey
NtResumeThread
NtResumeProcess
NtOpenThread
RtlCreateQueryDebugBuffer
RtlQueryProcessDebugInformation
RtlDestroyQueryDebugBuffer
RtlPcToFileHeader
RtlUnwindEx
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
NtQueryInformationThread
NtQuerySemaphore
NtSuspendThread
NtSuspendProcess
NtQueryInformationProcess
gdi32
SelectObject
SetBkColor
SetBkMode
SetTextColor
GetTextMetricsW
RectInRegion
SetMapMode
StartDocW
EndDoc
StartPage
EndPage
CreateFontIndirectW
GetTextExtentPoint32W
SetTextAlign
ExtTextOutW
LineTo
Rectangle
RestoreDC
SaveDC
SetROP2
MoveToEx
CreateBitmap
SelectClipRgn
GetStockObject
GetDeviceCaps
GetBkMode
GetBkColor
DeleteDC
CreateSolidBrush
CreateRectRgnIndirect
CreateRectRgn
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteObject
GetObjectW
CreateDIBSection
Polyline
comdlg32
GetSaveFileNameW
ChooseColorW
GetOpenFileNameW
ChooseFontW
PrintDlgW
CommDlgExtendedError
FindTextW
kernel32
WriteFile
GetFileTime
CloseHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageA
MapViewOfFile
UnmapViewOfFile
lstrlenW
TlsAlloc
TlsSetValue
CreateFileMappingW
GetModuleFileNameW
GetModuleHandleW
CreateProcessW
SetEnvironmentVariableW
ExpandEnvironmentStringsW
GetSystemWindowsDirectoryW
GetSystemWow64DirectoryW
GetFullPathNameW
InitializeSListHead
IsWow64Process
GetLocaleInfoW
GetTimeFormatW
GetDateFormatW
GetNumberFormatW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetFileAttributesW
FindFirstFileW
GetPrivateProfileStringW
FreeLibrary
LoadLibraryExW
ReadFile
MultiByteToWideChar
FindClose
FindNextFileW
LeaveCriticalSection
GetCurrentThread
EnterCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
CreateEventW
CreateThread
GetExitCodeThread
SetLastError
GetVersionExW
GetFileSizeEx
MulDiv
GetTickCount
LoadLibraryW
GlobalAddAtomW
FormatMessageW
LocalAlloc
GetFileSize
GetCommandLineW
LockResource
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
LoadResource
SizeofResource
FindResourceW
FindResourceExW
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalUnlock
TerminateThread
Module32FirstW
Module32NextW
DeleteCriticalSection
GetSystemTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
IsBadStringPtrW
OpenEventW
ReadProcessMemory
lstrcmpiW
GetEnvironmentVariableW
VirtualQueryEx
GetCurrentProcessId
SetFilePointer
GetSystemDirectoryW
SearchPathW
OpenThread
GetThreadContext
SuspendThread
ResumeThread
Thread32First
Thread32Next
ResetEvent
QueryPerformanceCounter
QueryPerformanceFrequency
IsBadReadPtr
GlobalFree
GlobalMemoryStatusEx
SetProcessWorkingSetSize
TerminateProcess
GetProcessId
PulseEvent
DeleteFileW
SetPriorityClass
GetComputerNameW
ProcessIdToSessionId
WTSGetActiveConsoleSessionId
GetLogicalProcessorInformation
GlobalMemoryStatus
VirtualAlloc
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetProcessWorkingSetSize
DeviceIoControl
DuplicateHandle
OutputDebugStringW
GetDriveTypeW
GetCurrentDirectoryW
CreateJobObjectW
IsProcessInJob
WideCharToMultiByte
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
GetNativeSystemInfo
LoadLibraryA
ExpandEnvironmentStringsA
FreeLibraryAndExitThread
GetStringTypeW
Sleep
GetModuleHandleExW
ExitProcess
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
InitializeCriticalSection
SetErrorMode
GetLastError
ExitThread
GetCurrentProcess
OpenProcess
GetLongPathNameW
LocalFree
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetVersion
GetProcAddress
TlsGetValue
SwitchToThread
TlsFree
CompareStringW
LCMapStringW
GetCPInfo
IsDebuggerPresent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
SetStdHandle
SetFilePointerEx
WriteConsoleW
SetEndOfFile
ReadConsoleW
GetStdHandle
GetFileType
GetCurrentThreadId
CreateFileW
QueryInformationJobObject
EncodePointer
user32
IsIconic
SetMenuItemInfoW
GetWindowDC
EndTask
RegisterWindowMessageW
DrawEdge
GetMessageW
TranslateMessage
DispatchMessageW
ExitWindowsEx
PostQuitMessage
IsWindow
SetLayeredWindowAttributes
CreateDialogParamW
GetDlgItemTextW
IsWindowEnabled
LoadAcceleratorsW
TranslateAcceleratorW
LoadMenuW
DrawMenuBar
CreateMenu
RemoveMenu
TrackPopupMenu
GetMenuInfo
SetMenuInfo
EndMenu
RedrawWindow
WindowFromPoint
CheckMenuRadioItem
DrawIconEx
IsDialogMessageW
LockWorkStation
IsHungAppWindow
PeekMessageW
SendMessageTimeoutW
CheckRadioButton
GetDlgCtrlID
MsgWaitForMultipleObjects
KillTimer
GetDesktopWindow
GetWindow
GetGuiResources
LoadBitmapW
CopyImage
GetWindowLongW
PtInRect
UnionRect
CopyRect
ScreenToClient
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
IsZoomed
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
DrawFrameControl
ChildWindowFromPoint
SetDlgItemTextW
DialogBoxParamW
GetMonitorInfoW
SetWindowTextW
GetDlgItem
EndDialog
DialogBoxIndirectParamW
GetScrollInfo
SetScrollInfo
GetParent
GetClassLongPtrW
SetWindowLongPtrW
GetWindowLongPtrW
OffsetRect
IntersectRect
InflateRect
FillRect
GetSysColorBrush
GetSysColor
MapWindowPoints
GetCursorPos
GetWindowRect
GetClientRect
GetPropW
SetPropW
ScrollWindowEx
ValidateRect
InvalidateRect
GetUpdateRgn
GetUpdateRect
EndPaint
BeginPaint
UpdateWindow
DrawTextW
SetTimer
ReleaseCapture
SetCapture
GetCapture
GetKeyState
GetFocus
SetWindowPos
CreateWindowExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
PostMessageW
LoadStringW
ReleaseDC
GetDC
EnumDisplaySettingsW
LoadImageW
DestroyIcon
LoadCursorW
GetWindowThreadProcessId
FindWindowExW
FindWindowW
SetCursor
MessageBoxW
SetForegroundWindow
DeleteMenu
InsertMenuW
GetSubMenu
CheckMenuItem
GetMenu
GetSystemMetrics
SetFocus
ShowWindow
MonitorFromPoint
EnumWindows
SetClassLongW
ClientToScreen
GetWindowTextW
InvalidateRgn
TrackPopupMenuEx
ModifyMenuW
AppendMenuW
GetMenuItemCount
GetMenuItemID
WaitForInputIdle
EnableMenuItem
CreatePopupMenu
EnableWindow
IsDlgButtonChecked
CheckDlgButton
SendMessageW
GetWindowPlacement
LoadIconW
SetWindowPlacement
DefMDIChildProcW
DefFrameProcW
DefDlgProcW
CreateIconIndirect
FrameRect
IsWindowVisible
ShowWindowAsync
DestroyWindow
GetClassNameW
EnumChildWindows
MoveWindow
SetWindowLongW
advapi32
RevertToSelf
OpenProcessToken
GetTokenInformation
AdjustTokenPrivileges
RegSetValueExW
RegUnLoadKeyW
RegQueryValueW
EqualSid
AllocateAndInitializeSid
FreeSid
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
LookupAccountSidW
LookupAccountNameW
CryptDestroyHash
RegDeleteValueW
CloseServiceHandle
GetServiceDisplayNameW
OpenSCManagerW
OpenServiceW
QueryServiceConfig2W
RegCloseKey
QueryServiceStatus
StartServiceW
RegCreateKeyW
MapGenericMask
QueryServiceObjectSecurity
SetServiceObjectSecurity
StartTraceW
ControlTraceW
OpenTraceW
ProcessTrace
CloseTrace
GetLengthSid
LookupPrivilegeValueW
ImpersonateLoggedOnUser
DuplicateTokenEx
RegCreateKeyExW
RegDeleteKeyW
CopySid
QueryServiceConfigW
SetTokenInformation
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthority
GetSidSubAuthorityCount
InitializeAcl
ControlService
RegQueryValueExW
AddAce
GetAce
RegEnumKeyW
RegEnumValueW
RegLoadKeyW
AddAccessAllowedAce
CreateRestrictedToken
GetSecurityInfo
SetSecurityInfo
LsaFreeMemory
LsaClose
LsaOpenPolicy
LsaEnumerateAccountRights
ConvertSidToStringSidW
FlushTraceW
RegConnectRegistryW
CreateProcessAsUserW
GetKernelObjectSecurity
SetKernelObjectSecurity
LookupPrivilegeNameW
EnumServicesStatusExW
RegOpenKeyExA
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyW
shell32
SHGetFileInfoW
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
Shell_NotifyIconW
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
CoSetProxyBlanket
oleaut32
SafeArrayGetElement
SysAllocString
SysFreeString
SafeArrayUnaccessData
SysAllocStringByteLen
VariantInit
VariantClear
VariantCopy
SysStringLen
VariantChangeType
SafeArrayDestroy
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayAccessData
SysAllocStringLen
winhttp
WinHttpReadData
WinHttpWriteData
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpConnect
WinHttpOpen
WinHttpCloseHandle
psapi
QueryWorkingSet
GetMappedFileNameW
GetModuleFileNameExW
Sections
.text Size: 869KB - Virtual size: 869KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 297KB - Virtual size: 297KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 191KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ