Static task
static1
Behavioral task
behavioral1
Sample
LaunchWinApp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
LaunchWinApp.exe
Resource
win10v2004-20230220-en
General
-
Target
LaunchWinApp.exe
-
Size
32KB
-
MD5
5db8f009037714ed21ab734583914c6e
-
SHA1
e2f49cef31a1bc3be93c9f46b697462744093017
-
SHA256
dd7633f79ab540a49b9ce5f8295d53937b933b520cd706785e433dac9da93727
-
SHA512
90e18edbe2c5e03f99b825c5e15eb9e0e9a87f3f93fb1790de904f4f1be6a3c0f07c6afd8f4a0e86b61be15d5231559240ae1bda15fd42df35effb324e1c0c53
-
SSDEEP
768:8K4tlUw2ZbNUYq+KGEz9Znt2l6d5GMmj2mZJyvC:Jo+w2LfwnzGVJyvC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource LaunchWinApp.exe
Files
-
LaunchWinApp.exe.exe windows x86
dc2b1716cffbc8111a0ff83c20ca0ac4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
EventSetInformation
EventRegister
EventWriteTransfer
EventUnregister
kernel32
GetModuleFileNameA
InitOnceBeginInitialize
CreateSemaphoreExW
HeapFree
SetLastError
GetCommandLineW
GetCurrentProcess
ReleaseSemaphore
GetModuleHandleExW
K32GetModuleFileNameExW
WaitForSingleObject
GetCurrentThreadId
ReleaseMutex
K32EnumProcessModulesEx
OpenProcess
FormatMessageW
GetLastError
OutputDebugStringW
InitOnceComplete
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
HeapAlloc
GetProcAddress
CreateMutexExW
LocalFree
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
DebugBreak
IsDebuggerPresent
msvcrt
__dllonexit
_unlock
_purecall
_onexit
??1type_info@@UAE@XZ
memmove
_lock
?terminate@@YAXXZ
memcpy_s
_wcmdln
_initterm
_except_handler4_common
__p__fmode
_cexit
_exit
exit
__set_app_type
??3@YAXPAX@Z
_amsg_exit
__p__commode
_vsnwprintf
_XcptFilter
_vsnprintf_s
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
__setusermatherr
_controlfp
memcpy
_CxxThrowException
__CxxFrameHandler3
__wgetmainargs
malloc
_callnewh
??0exception@@QAE@ABQBD@Z
??0exception@@QAE@ABQBDH@Z
?what@exception@@UBEPBDXZ
memset
api-ms-win-core-shlwapi-legacy-l1-1-0
PathFindExtensionW
api-ms-win-core-com-l1-1-0
CoCreateFreeThreadedMarshaler
api-ms-win-core-winrt-l1-1-0
RoUninitialize
RoInitialize
oleaut32
SysFreeString
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-processthreads-l1-1-0
TerminateProcess
GetStartupInfoW
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetSystemTimeAsFileTime
iertutil
CreateUri
ntdll
NtQueryInformationProcess
shell32
CommandLineToArgvW
ShellExecuteExW
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ