Static task
static1
Behavioral task
behavioral1
Sample
36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe
Resource
win7-20230220-en
General
-
Target
36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a
-
Size
7.2MB
-
MD5
23c28c4c8ee60fa2042aa374739d712a
-
SHA1
17363e779d8956d38ec84b0281823c225433d729
-
SHA256
36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a
-
SHA512
76829322577a15454e1e137916803fbba4dd4fe7e259a4acfb6c756885f7bbbe2a53613063c0013e6af4dc2270ce9a50ac1d7238eb06df045d91a0a9b63c60e8
-
SSDEEP
49152:FaSPHIVAnCFFDh3ZY6jhT85sCL1Ge96ShWc7FNbqb4mbm:FaSPoVAYzZhIySY+hrpUb4Gm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a
Files
-
36dbddb3ec05a1102224f6185edefd2b67ad81fefe4278372e4c5414c6edc09a.exe windows x86
902c8ce1c8cd5980422e7e3ab48764d8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileW
GetDiskFreeSpaceExW
CreateDirectoryW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
GetTickCount
GetStartupInfoW
CreateProcessW
GetACP
SetLastError
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
GetProcessHeap
InterlockedCompareExchange
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
GetVersionExW
GetNativeSystemInfo
WaitForSingleObject
InitializeCriticalSection
FindClose
FindFirstFileExW
FindNextFileW
InterlockedDecrement
GlobalAlloc
GlobalLock
InterlockedIncrement
GlobalUnlock
lstrcmpW
MulDiv
ReadFile
SetFilePointer
GetFileSize
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
ReleaseSemaphore
DuplicateHandle
DeleteFileW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
Sleep
CreateEventW
WriteConsoleW
SetStdHandle
CreateThread
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
FlushFileBuffers
GetFileType
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetCurrentThread
GetStdHandle
GetModuleHandleExW
ExitProcess
LoadLibraryExW
InterlockedFlushSList
RtlUnwind
SetEvent
GetCurrentThreadId
GetSystemTimeAsFileTime
CreateFileW
WriteFile
LeaveCriticalSection
GetModuleFileNameW
EnterCriticalSection
GetPhysicallyInstalledSystemMemory
GetModuleHandleW
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
OutputDebugStringW
GetCPInfo
GetLocaleInfoW
LCMapStringW
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
QueryPerformanceFrequency
GetStringTypeW
TryEnterCriticalSection
InitializeSListHead
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
LoadLibraryExA
VirtualQuery
GetExitCodeProcess
CloseHandle
FreeLibrary
GetProcAddress
LoadLibraryW
DeleteCriticalSection
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
LocalFree
SetEndOfFile
GetCommandLineW
VirtualProtect
GetSystemInfo
user32
PostThreadMessageW
wsprintfW
DefWindowProcW
LoadCursorW
RegisterClassExW
SendMessageW
TranslateMessage
DispatchMessageW
SetWindowLongW
DestroyWindow
GetWindowLongW
SetTimer
GetCursorPos
UnregisterClassW
PeekMessageW
KillTimer
GetWindowTextLengthW
GetWindow
GetFocus
GetDC
SetWindowPos
FillRect
ScreenToClient
GetSystemMetrics
SetWindowTextW
ShowWindow
IsWindow
InvalidateRgn
RedrawWindow
ClientToScreen
DestroyAcceleratorTable
IsChild
GetSysColor
MoveWindow
CreateAcceleratorTableW
SetFocus
CharNextW
GetClassNameW
SetCapture
GetClientRect
GetDlgItem
GetDesktopWindow
SystemParametersInfoW
GetParent
RegisterWindowMessageW
ReleaseCapture
InvalidateRect
ReleaseDC
BeginPaint
EndPaint
GetWindowTextW
CallWindowProcW
CreateWindowExW
GetClassInfoExW
PostQuitMessage
MsgWaitForMultipleObjects
gdi32
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetStockObject
GetDeviceCaps
DeleteDC
GetObjectW
DeleteObject
CreateSolidBrush
shell32
SHGetFolderPathW
CommandLineToArgvW
ole32
CoAddRefServerProcess
CoReleaseServerProcess
OleUninitialize
CoCreateInstance
OleInitialize
CoTaskMemFree
CoTaskMemAlloc
StringFromGUID2
CLSIDFromProgID
CreateStreamOnHGlobal
CLSIDFromString
OleLockRunning
StringFromCLSID
CoGetClassObject
CoCreateGuid
oleaut32
SysFreeString
SysStringLen
VariantCopy
VariantClear
SysAllocString
OleCreateFontIndirect
DispCallFunc
VariantChangeType
LoadRegTypeLi
VariantInit
LoadTypeLi
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
advapi32
CryptDestroyKey
CryptAcquireContextW
CryptVerifySignatureW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptReleaseContext
RegSetValueExW
RegNotifyChangeKeyValue
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
shlwapi
PathFindFileNameW
ws2_32
ntohl
Sections
.text Size: 367KB - Virtual size: 367KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 415KB - Virtual size: 414KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ