Static task
static1
Behavioral task
behavioral1
Sample
powershell.exe
Resource
win10v2004-20230703-en
General
-
Target
powershell.exe
-
Size
480KB
-
MD5
bcf01e61144d6d6325650134823198b8
-
SHA1
eb39e26a364ecd0691a59fcef61a90334112617e
-
SHA256
b4e7bc24bf3f5c3da2eb6e9ec5ec10f90099defa91b820f2f3fc70dd9e4785c4
-
SHA512
77871fe73c337fa87cc4b5162af5fd405ed5e63ed90faaee226d2763dc5be6a6219a1e0bd0b00a33e91515dbc7f21843682bc28436bb757c37e761de09cc4c65
-
SSDEEP
6144:RthW67lV1c0OGWwO9sV1yZywi/PzNKXzJ7BapCK5d3klRzULOnWyjLsPhAQzqO:Dhx1c07W2KXzJ4pdd3klnnWosPhnzq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource powershell.exe
Files
-
powershell.exe.exe windows x64
88cb9a420410bda787e305b65518a934
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_initterm
__C_specific_handler
_fmode
_commode
_lock
_unlock
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
__dllonexit
_XcptFilter
memmove
memcpy
_CxxThrowException
?what@exception@@UEBAPEBDXZ
_onexit
?terminate@@YAXXZ
??0exception@@QEAA@AEBQEBDH@Z
??1type_info@@UEAA@XZ
memcmp
_wcsicmp
_wcsnicmp
bsearch
fclose
_wfopen
_itow_s
wcstoul
wcschr
__uncaught_exception
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
wcsncmp
memmove_s
wcsrchr
free
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
_purecall
??3@YAXPEAX@Z
memcpy_s
_vsnwprintf
??_V@YAXPEAX@Z
_amsg_exit
__CxxFrameHandler3
memset
atl
ord30
kernel32
GetVersionExW
GetLocaleInfoW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SearchPathW
UnmapViewOfFile
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
Sleep
IsDebuggerPresent
IsWow64Process
SetConsoleTitleW
DebugBreak
GetFileType
LoadResource
FreeLibrary
GetModuleHandleW
CreateFileMappingW
GetProcessHeap
GetCurrentProcessId
RtlLookupFunctionEntry
FindResourceExW
GetStartupInfoW
GetModuleFileNameA
VerSetConditionMask
FindFirstFileW
MapViewOfFile
DeleteCriticalSection
CompareStringW
AcquireSRWLockShared
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
LocalFree
GetCurrentProcess
GetStdHandle
ReleaseSemaphore
WriteFile
CreateMutexExW
GetModuleHandleExW
ExpandEnvironmentStringsW
GetProcAddress
WriteConsoleW
LoadLibraryExW
GetModuleFileNameW
SetThreadUILanguage
SetErrorMode
VerifyVersionInfoW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
ReleaseMutex
ReleaseSRWLockExclusive
FormatMessageW
HeapAlloc
CreateThreadpoolTimer
GetLastError
ReleaseSRWLockShared
OutputDebugStringW
CloseThreadpoolTimer
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
oleaut32
SysFreeString
SafeArrayPutElement
SafeArrayCreate
SysStringLen
SysAllocString
VariantClear
advapi32
EventSetInformation
RegEnumKeyExW
RegGetValueW
EventUnregister
EventRegister
RegQueryValueExW
EventWriteTransfer
RegCloseKey
RegOpenKeyExW
ole32
CoTaskMemAlloc
CoInitialize
PropVariantClear
CoInitializeEx
CoUninitialize
CoCreateInstance
user32
LoadStringW
mscoree
CorBindToRuntimeEx
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 351KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ