Static task
static1
Behavioral task
behavioral1
Sample
MsgServer2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
MsgServer2.exe
Resource
win10v2004-20230703-en
General
-
Target
MsgServer2.exe
-
Size
172KB
-
MD5
85dfac442e9dc360fcb3018de6f569e1
-
SHA1
a91cd58f990584cb4ade654985a08d7548ff7711
-
SHA256
84cbda44f3f295929907e0e4dbf738030f6b8afa259c65ca039c378093e2475d
-
SHA512
25c061f340dcc02bf0dadf8b19bde4548f4f84b791e8352ad2354a55ac32b5e7a5e521adcc28cdcd2706daa9350f1b943c514758d74248a81b5311ba12486381
-
SSDEEP
3072:ZbD8JbOX9L7WDQG7qaM+3wlbBGJIRrbqd7k/vb7/+pkHzht03W5gYLKupBtkfQLs:ZMJbw9L7WQi3wlsJIUkH3GpkHFt03Wq7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource MsgServer2.exe
Files
-
MsgServer2.exe.exe windows x86
b83eea344dba4fd183e4a46fdba8c56a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord665
ord641
ord2514
ord6117
ord1979
ord5442
ord5186
ord354
ord924
ord858
ord4129
ord5683
ord2725
ord703
ord603
ord2454
ord1969
ord273
ord1643
ord403
ord541
ord798
ord1997
ord6407
ord922
ord2820
ord3811
ord5194
ord533
ord3318
ord3337
ord551
ord3663
ord5465
ord5645
ord2065
ord6877
ord6283
ord4486
ord6648
ord2763
ord6930
ord801
ord6928
ord926
ord5710
ord2764
ord5572
ord2915
ord939
ord941
ord6883
ord5265
ord4376
ord4853
ord4998
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord3521
ord1146
ord1168
ord324
ord4234
ord4710
ord4287
ord6197
ord6378
ord2379
ord755
ord470
ord6453
ord6215
ord4202
ord6402
ord5440
ord6383
ord5450
ord6394
ord1871
ord4220
ord2584
ord3654
ord2863
ord2438
ord1644
ord6375
ord4274
ord535
ord2614
ord540
ord635
ord317
ord4673
ord4278
ord800
ord860
ord2818
ord823
ord2077
ord1200
ord2029
ord4919
ord791
ord523
ord967
ord1995
ord5479
ord5797
ord4975
ord4863
ord4335
ord4447
ord4411
ord2032
ord5482
ord5811
ord4779
ord5308
ord1925
ord537
ord6282
ord825
ord1576
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
_mbsicmp
_beginthreadex
atol
_endthreadex
_setmbcp
__CxxFrameHandler
atoi
printf
_CxxThrowException
putc
getc
fread
_mbscmp
_controlfp
kernel32
TerminateProcess
OpenProcess
TerminateThread
lstrlenA
lstrcpyA
CreateToolhelp32Snapshot
OpenMutexA
ReleaseMutex
GetVersion
GetModuleHandleA
GetStartupInfoA
Process32First
Process32Next
CloseHandle
MultiByteToWideChar
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
GetLastError
GetComputerNameA
GetModuleFileNameA
CreateMutexA
WaitForSingleObject
GetTickCount
DeleteFileA
user32
SetForegroundWindow
TrackPopupMenu
IsWindow
KillTimer
IsIconic
GetSystemMetrics
GetClientRect
GetCursorPos
EnableWindow
LoadIconA
SetTimer
RegisterWindowMessageA
SendMessageA
GetSubMenu
LoadMenuA
DrawIcon
CheckMenuItem
advapi32
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDestroyHash
CryptEncrypt
CryptDestroyKey
CryptReleaseContext
RegCreateKeyExA
shell32
Shell_NotifyIconA
wsock32
ntohs
WSAGetLastError
recv
__WSAFDIsSet
select
gethostbyname
WSACleanup
WSAStartup
htons
htonl
shutdown
ntohl
shlwapi
PathFileExistsA
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ