Static task
static1
Behavioral task
behavioral1
Sample
df2a115ba2e612274f7868bb04c46f10c32b61d3a67d7ea0dcdce529c6685a40.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
df2a115ba2e612274f7868bb04c46f10c32b61d3a67d7ea0dcdce529c6685a40.exe
Resource
win10v2004-20230621-en
General
-
Target
df2a115ba2e612274f7868bb04c46f10c32b61d3a67d7ea0dcdce529c6685a40
-
Size
136KB
-
MD5
c554dccd6d7c1fe2450ba62efa495219
-
SHA1
c01122895bad29ae3b8312064dc2dd8faec59829
-
SHA256
df2a115ba2e612274f7868bb04c46f10c32b61d3a67d7ea0dcdce529c6685a40
-
SHA512
40ab2e02623c48b8cb4dfc737c42ff15875795eb4f42cd9897c485fc8fb1b56b9bd9d7440b63da12483418c002037a3397fa23059d3bfef96b5d9f31c2e969d4
-
SSDEEP
3072:CaZYJWG4y2gJ2xwB0ZxPTxGqCvSEHqQcqr1u12P2bwZ2:CqAWG4y3J2xwB0ZxPT4qCKEHqZqr1u1t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df2a115ba2e612274f7868bb04c46f10c32b61d3a67d7ea0dcdce529c6685a40
Files
-
df2a115ba2e612274f7868bb04c46f10c32b61d3a67d7ea0dcdce529c6685a40.exe windows x64
466b7fd58dd089c08f29c6491c918817
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateToolhelp32Snapshot
Process32NextW
LoadLibraryA
LockResource
Process32FirstW
OpenProcess
LoadResource
FindResourceW
GetProcAddress
GetCurrentProcessId
K32GetProcessImageFileNameW
GetTempPathW
HeapFree
RtlAddFunctionTable
SizeofResource
GetModuleHandleW
GetProcessHeap
ExitProcess
GetCurrentDirectoryW
HeapAlloc
GetLastError
FormatMessageW
MultiByteToWideChar
GetEnvironmentVariableW
CloseHandle
user32
EnumWindows
FindWindowW
GetClassNameW
IsHungAppWindow
UnhookWindowsHookEx
MessageBoxW
SendMessageW
SetWindowsHookExW
IsWindowVisible
GetWindowTextW
GetWindowThreadProcessId
advapi32
CryptImportKey
CryptReleaseContext
CryptDecrypt
CryptAcquireContextW
CryptDestroyKey
OpenServiceW
ChangeServiceConfigW
StartServiceW
DeleteService
OpenSCManagerW
CloseServiceHandle
CreateServiceW
shell32
ShellExecuteExW
crypt32
CryptStringToBinaryW
ntdll
NtWaitForSingleObject
NtCreateFile
NtClose
NtDeleteFile
RtlRandomEx
NtWriteFile
NtMapViewOfSection
RtlDecompressBuffer
NtCreateSection
msvcrt
free
wcschr
wcstok_s
_wcsicmp
_wcsdup
_wcstoui64
swprintf_s
memcpy
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE