Static task
static1
Behavioral task
behavioral1
Sample
156f1752c110d13265908cc494f1670873268b838107a8ef049e93895f5c4e03.exe
Resource
win10v2004-20230220-en
General
-
Target
156f1752c110d13265908cc494f1670873268b838107a8ef049e93895f5c4e03.exe.7z
-
Size
236KB
-
MD5
1ca3be8740c6fbce5c87ce9a3f3bcd5c
-
SHA1
b442ca6253c21bc2bcedcd1db98eb33785d41cbf
-
SHA256
0a8340c904687df79cc07b877a381261c2d7a3ab9c73b305d41ba11bf6d75c5e
-
SHA512
14e69f034026004fcfda831f8e8968ce90e5d8ad5b80d0900840b77def40785e66ef3f056103308e79de84393fef4adb009fd013e3e5824f055a101204479fb5
-
SSDEEP
6144:Dq7+Cxej3d5JRN0fJNI69u/iCpDUm701/uBCFyuMN6HG1gee:Dq7H+3ddNKJ/9zCl0xUuMQie
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/156f1752c110d13265908cc494f1670873268b838107a8ef049e93895f5c4e03
Files
-
156f1752c110d13265908cc494f1670873268b838107a8ef049e93895f5c4e03.exe.7z.7z
Password: infected
-
156f1752c110d13265908cc494f1670873268b838107a8ef049e93895f5c4e03.exe windows x64
0ab1571a8e5113ff14ce53e0c36a041d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
FileTimeToLocalFileTime
GetFileAttributesW
GetFileAttributesExW
GetFileSizeEx
GetFileTime
SystemTimeToTzSpecificLocalTime
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
DuplicateHandle
WriteConsoleW
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetTimeZoneInformation
GetConsoleCP
ReadConsoleW
GetConsoleMode
SetFilePointerEx
LCMapStringW
HeapQueryInformation
GetCommandLineA
VirtualQuery
VirtualAlloc
GetSystemInfo
RtlPcToFileHeader
RtlUnwindEx
OutputDebugStringW
UnlockFile
SetEndOfFile
LockFile
GetVolumeInformationW
GetFullPathNameW
GetFileSize
FindFirstFileW
FindClose
DeleteFileW
CreateFileW
VirtualProtect
GlobalFlags
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
GetCurrentProcess
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FileTimeToSystemTime
GetCurrentProcessId
SetErrorMode
GetVersionExW
GetCurrentThread
lstrcmpA
CreateEventW
CompareStringW
GlobalFindAtomW
GlobalAddAtomW
lstrcmpW
GlobalDeleteAtom
LoadLibraryExW
GetProcAddress
FreeLibrary
GetSystemDirectoryW
GetCurrentThreadId
EncodePointer
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
QueryActCtxW
FindActCtxSectionStringW
DeactivateActCtx
ActivateActCtx
CreateActCtxW
LoadLibraryW
GetModuleHandleExW
SetLastError
OutputDebugStringA
GetProcessHeap
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
GetModuleHandleW
GetCommandLineW
SetFilePointer
ReadFile
WriteFile
SetConsoleOutputCP
GetConsoleOutputCP
GetFileType
FlushFileBuffers
CloseHandle
GetExitCodeProcess
WaitForSingleObject
ExitProcess
LocalFree
GetStdHandle
CreateThread
Sleep
ExpandEnvironmentStringsW
GetModuleFileNameW
FormatMessageW
GetLastError
GetACP
WideCharToMultiByte
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
InitializeSListHead
SizeofResource
user32
IsWindowEnabled
ShowWindow
PostQuitMessage
LoadBitmapW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetCursorPos
GetMessageW
GetMonitorInfoW
MonitorFromWindow
WinHelpW
LoadIconW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetWindow
GetLastActivePopup
GetTopWindow
GetClassNameW
GetClassLongPtrW
SetWindowLongPtrW
GetWindowLongPtrW
SetWindowLongW
GetWindowLongW
PtInRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowTextW
RemovePropW
GetPropW
SetPropW
GetScrollPos
RedrawWindow
ValidateRect
BeginPaint
SetForegroundWindow
GetForegroundWindow
UpdateWindow
SetMenu
GetMenu
EnableWindow
GetCapture
GetKeyState
GetActiveWindow
MessageBoxW
MsgWaitForMultipleObjects
PeekMessageW
GetFocus
GetDlgCtrlID
GetDlgItem
IsIconic
IsWindowVisible
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPos
DestroyWindow
IsMenu
IsWindow
SetWindowTextW
GetWindowThreadProcessId
GetSystemMetrics
GetDC
ReleaseDC
GetSysColorBrush
LoadCursorW
DrawTextW
DrawTextExW
GrayStringW
TabbedTextOutW
GetWindowRect
TranslateMessage
DispatchMessageW
CharToOemBuffW
GetClientRect
SetRectEmpty
OffsetRect
GetParent
GetSubMenu
GetMenuItemID
GetMenuItemCount
RegisterWindowMessageW
GetMessagePos
GetMessageTime
SendMessageW
PostMessageW
DefWindowProcW
CallWindowProcW
RegisterClassW
GetClassInfoW
GetClassInfoExW
CreateWindowExW
DestroyMenu
ClientToScreen
InvalidateRect
KillTimer
SetTimer
SetCursor
CharUpperW
EndPaint
RealChildWindowFromPoint
gdi32
Escape
GetClipBox
GetStockObject
PtVisible
RectVisible
RestoreDC
SaveDC
SelectObject
SetMapMode
DeleteObject
TextOutW
ExtTextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
SetTextColor
SetBkColor
GetDeviceCaps
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegEnumValueW
RegSetValueExW
RegDeleteValueW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegCreateKeyExW
CreateProcessWithLogonW
RegQueryValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
shell32
ShellExecuteW
shlwapi
PathIsUNCW
PathStripToRootW
PathFindFileNameW
PathFindExtensionW
ole32
CoTaskMemFree
CoInitialize
CoGetObject
CLSIDFromString
CoCreateInstance
CLSIDFromProgID
CoDisconnectObject
StringFromGUID2
CoUninitialize
CoCreateGuid
oleaut32
LoadTypeLi
SysStringLen
LoadRegTypeLi
VariantChangeType
SysAllocStringLen
LoadTypeLibEx
SysAllocString
VariantClear
VariantCopy
VariantInit
SysFreeString
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 321KB - Virtual size: 321KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ