Static task
static1
Behavioral task
behavioral1
Sample
1fac96202f424aexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
1fac96202f424aexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
1fac96202f424aexeexeexeex.exe
-
Size
179KB
-
MD5
1fac96202f424a84b1e027095dffa79f
-
SHA1
0b1856b00ec4b3ebe111783294e19426d080d7fb
-
SHA256
377140ad218493163d8e35d1470cb40454f782dc9681d8015aac28bd6d84dcf2
-
SHA512
b0fb6e993ab1e3ed6e4abac255f0200d138735e0622de3225c32990334656d6eb5d6199b4782c3ee7ae5016bd47b1e7fcb6ddf7fd6fcf8831b4b2353e47cc2a4
-
SSDEEP
3072:bXpNCF55JbY7shPBwT+dGg3oexFDGptV0gic8MDuzASMwaiaf5YAr:7pQF55NUsFBwT+r3o26pMjEDuzAhf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1fac96202f424aexeexeexeex.exe
Files
-
1fac96202f424aexeexeexeex.exe.exe windows x86
625bb0ef934524e100aaa86c0947b22e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptDecodeObjectEx
CryptBinaryToStringA
CryptStringToBinaryA
shlwapi
PathCombineW
StrSpnA
StrPBrkA
StrStrIW
PathSkipRootW
PathFindFileNameW
StrStrA
StrCmpNA
StrToIntA
StrCmpNIW
StrChrA
StrCmpNIA
PathFindFileNameA
StrChrW
StrCmpNW
PathMatchSpecW
StrToInt64ExA
StrCpyNW
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
ws2_32
closesocket
gethostbyname
htonl
sendto
inet_addr
socket
WSAStartup
inet_ntoa
shutdown
htons
kernel32
GetCommandLineW
SearchPathW
CreateMutexW
GetTempFileNameW
GetCurrentProcess
GetCurrentThread
TerminateProcess
GetModuleFileNameW
SetErrorMode
SetThreadPriority
GetTempPathW
GetLastError
LeaveCriticalSection
Sleep
OutputDebugStringA
SetProcessShutdownParameters
SetFilePointer
lstrlenA
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
InitializeCriticalSection
WriteFile
lstrcpyA
OutputDebugStringW
PeekNamedPipe
SystemTimeToFileTime
MoveFileExW
SetFileTime
SetEvent
WaitForSingleObject
SetFilePointerEx
CreateProcessA
GetSystemDirectoryA
GetLocalTime
CreatePipe
GetTickCount
GetFileSize
GetDateFormatW
OpenEventW
GetCurrentThreadId
LocalFree
GetProcAddress
GetTimeFormatW
lstrcpynW
GetModuleHandleW
MulDiv
GetFileSizeEx
lstrcpynA
GetFileAttributesW
CreateThread
lstrcpyW
FileTimeToLocalFileTime
DeleteCriticalSection
GetFileTime
FileTimeToSystemTime
CreateEventW
MultiByteToWideChar
WideCharToMultiByte
FindFirstFileW
GetNativeSystemInfo
GetDriveTypeW
GetLogicalDrives
VirtualFree
VirtualAlloc
FindClose
QueryDosDeviceW
IsBadStringPtrW
lstrcmpiW
lstrcatW
FindNextFileW
SetFileAttributesW
GetCurrentProcessId
HeapReAlloc
HeapAlloc
HeapFree
HeapCreate
HeapValidate
SetLastError
GetProcessHeaps
HeapSetInformation
CreateDirectoryW
GetComputerNameA
IsBadReadPtr
IsBadWritePtr
IsBadStringPtrA
CloseHandle
WaitForMultipleObjects
CreateToolhelp32Snapshot
VirtualProtect
EnterCriticalSection
GetModuleHandleA
OpenProcess
lstrcmpiA
Process32NextW
GetVersionExW
ExitProcess
GetSystemInfo
GetHandleInformation
TlsAlloc
FlushFileBuffers
lstrlenW
CreateFileW
RtlUnwind
Process32FirstW
MoveFileW
ReadFile
user32
ReleaseDC
GetKeyboardLayoutList
GetSystemMetrics
CharLowerBuffA
SystemParametersInfoW
wsprintfA
RegisterClassExW
UnregisterClassW
TranslateMessage
PeekMessageW
CreateWindowExW
RegisterClassW
DefWindowProcW
DispatchMessageW
GetForegroundWindow
FillRect
DrawTextA
wsprintfW
GetDC
advapi32
InitializeSecurityDescriptor
AllocateAndInitializeSid
FreeSid
LookupPrivilegeValueW
GetTokenInformation
AdjustTokenPrivileges
OpenProcessToken
RegOpenKeyExW
RegCloseKey
RegOpenKeyW
RegQueryValueExW
SetSecurityDescriptorDacl
CryptReleaseContext
CryptGenRandom
DuplicateToken
CheckTokenMembership
CreateWellKnownSid
CryptGetKeyParam
CryptAcquireContextW
CryptDestroyKey
ole32
CoInitializeEx
CoCreateInstance
CoInitialize
CoUninitialize
shell32
ShellExecuteExW
SHGetFolderPathW
CommandLineToArgvW
SHChangeNotify
ShellExecuteW
gdi32
DeleteObject
SetTextColor
DeleteDC
GetDeviceCaps
GetDIBits
SetBkColor
SetPixel
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
CreateFontW
GetObjectW
GetStockObject
ntdll
ZwOpenProcess
memcpy
isspace
_allmul
RtlDosPathNameToNtPathName_U
NtDeleteFile
RtlFreeUnicodeString
_alldiv
tolower
memmove
ZwQuerySystemInformation
memset
_aulldvrm
NtQueryVirtualMemory
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ