Static task
static1
Behavioral task
behavioral1
Sample
158bb7846c3f023b77777ebc80b2083efac5523e58d084622ddd43c6cbce5f4b.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
158bb7846c3f023b77777ebc80b2083efac5523e58d084622ddd43c6cbce5f4b.exe
Resource
win10v2004-20230703-en
General
-
Target
158bb7846c3f023b77777ebc80b2083efac5523e58d084622ddd43c6cbce5f4b
-
Size
1.6MB
-
MD5
fa141e79dcfc3e5c9c86989968b96028
-
SHA1
def723c3a3c71329135d155408704394d4e17a4e
-
SHA256
158bb7846c3f023b77777ebc80b2083efac5523e58d084622ddd43c6cbce5f4b
-
SHA512
d801f3ed43e1ea5b0f6299a3369ff2ca02f4e87355320b29703aae822d0716755450b8e810269162648e0b2bc78c1f1e9d56c600ba366165a796da9caa338e67
-
SSDEEP
49152:WcWe0YOO+vmwacsrVM0Q9OTP+qiMRKm1ygz8zEsvS7Jo1St:bKY0mpcH99u1ygB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 158bb7846c3f023b77777ebc80b2083efac5523e58d084622ddd43c6cbce5f4b
Files
-
158bb7846c3f023b77777ebc80b2083efac5523e58d084622ddd43c6cbce5f4b.exe windows x86
bb72cdff8bfa7a68bef2d9de0eebeafc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
GetEnvironmentVariableW
GetLogicalDriveStringsW
VirtualQuery
GetPrivateProfileStringW
DeleteFileW
GetTickCount
MoveFileW
WriteFile
CreateFileW
GetModuleHandleExW
ReleaseMutex
GetVersionExW
SetFileAttributesW
lstrlenW
ReadFile
SetFilePointer
SetEndOfFile
GetFileSize
GetACP
GlobalMemoryStatusEx
SetEvent
InterlockedExchange
SetLastError
InterlockedExchangeAdd
ExpandEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetFileAttributesW
VirtualFree
VirtualProtect
QueryDosDeviceW
GetExitCodeProcess
GetModuleHandleW
CreateProcessW
GetProcessHeap
LocalFree
HeapAlloc
OpenProcess
WaitForSingleObject
WaitForMultipleObjects
HeapFree
MoveFileExW
SetErrorMode
GetCurrentProcess
OpenMutexW
GetCurrentProcessId
CloseHandle
Sleep
GetModuleFileNameW
VirtualAlloc
GetModuleHandleA
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
GetDriveTypeW
SearchPathW
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
GetVolumeInformationW
GetDiskFreeSpaceW
MultiByteToWideChar
WideCharToMultiByte
TerminateProcess
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
LoadLibraryExW
GetCurrentThreadId
GetComputerNameExW
SetFileTime
GetFileTime
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateMutexW
CreateEventW
ResetEvent
FindNextFileW
FindClose
FileTimeToSystemTime
ResumeThread
RaiseException
CreateDirectoryW
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
GetCurrentDirectoryW
GetWindowsDirectoryW
CopyFileW
GetTempFileNameW
GetFileSizeEx
FormatMessageW
DeviceIoControl
EncodePointer
GetCPInfo
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetLocalTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
OutputDebugStringW
GetStdHandle
GetFileType
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
CreateThread
ExitThread
FreeLibraryAndExitThread
ExitProcess
GetCurrentThread
HeapReAlloc
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
FlushFileBuffers
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
WaitForSingleObjectEx
SetStdHandle
HeapSize
WriteConsoleW
InterlockedDecrement
InterlockedIncrement
PeekNamedPipe
GetExitCodeThread
GetOverlappedResult
WaitNamedPipeW
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
ReleaseSemaphore
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
DeleteCriticalSection
DecodePointer
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
DuplicateHandle
CreateTimerQueue
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
user32
wsprintfW
advapi32
RegCloseKey
RegCreateKeyExW
RegSetValueExW
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 271KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ