Static task
static1
Behavioral task
behavioral1
Sample
10896a15d654f5a10ccd0998daaa1e823e7f7f637c1070522f11c6f4ed9c8032.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
10896a15d654f5a10ccd0998daaa1e823e7f7f637c1070522f11c6f4ed9c8032.exe
Resource
win10v2004-20230703-en
General
-
Target
10896a15d654f5a10ccd0998daaa1e823e7f7f637c1070522f11c6f4ed9c8032
-
Size
1.1MB
-
MD5
4ec239d6b15d95c247014e0e0a8c971a
-
SHA1
4e727181e3ef2dce2aca25358367631f05823e38
-
SHA256
10896a15d654f5a10ccd0998daaa1e823e7f7f637c1070522f11c6f4ed9c8032
-
SHA512
f859b65fb014f1c861123a0d0c4334712bb7d3a6707222b48ccb91cea3468c4827f038298e1fca806e2d410419179be9ad95510be050f84a805fd58a2fa33f82
-
SSDEEP
24576:XmI3TEnF2I1K3Qbp9L7AHW7JQ65NM80Ar9SNwsLIBwSg:1iKg9kW7JQ6xbr9mwYIuSg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10896a15d654f5a10ccd0998daaa1e823e7f7f637c1070522f11c6f4ed9c8032
Files
-
10896a15d654f5a10ccd0998daaa1e823e7f7f637c1070522f11c6f4ed9c8032.exe windows x86
63420503b1bfa04963f661b5a6cb86a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
psapi
GetProcessImageFileNameW
kernel32
HeapFree
GetCurrentProcess
GetLastError
LoadLibraryW
HeapAlloc
GetProcAddress
LocalFree
GetProcessHeap
GetModuleHandleW
FreeLibrary
GetUserDefaultLangID
QueryDosDeviceW
GetEnvironmentVariableW
GetLogicalDriveStringsW
VirtualQuery
DeviceIoControl
LocalAlloc
GetSystemDirectoryW
FileTimeToSystemTime
FileTimeToLocalFileTime
SetThreadExecutionState
GetCurrentProcessId
GetDriveTypeW
OpenThread
TerminateThread
OutputDebugStringW
Sleep
MoveFileExW
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
WriteConsoleW
SetStdHandle
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
GetLocalTime
GetCurrentThreadId
CreateFileW
SetFilePointer
GetModuleFileNameW
WriteFile
CloseHandle
OpenProcess
WaitForSingleObject
GetTickCount
WaitForMultipleObjects
HeapSize
DecodePointer
GetProcessTimes
TryEnterCriticalSection
GetTimeZoneInformation
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetVersionExW
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
OpenEventW
CreateEventW
SetEvent
ResetEvent
GetComputerNameExW
GlobalAlloc
GlobalFree
SearchPathW
ExpandEnvironmentStringsW
CreateProcessW
GetExitCodeProcess
FindFirstFileW
GetLongPathNameW
GetShortPathNameW
GetFileAttributesExW
CreateMutexW
ReleaseMutex
OpenMutexW
WideCharToMultiByte
SwitchToThread
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetACP
MultiByteToWideChar
GetVolumeInformationW
GetDiskFreeSpaceW
ResumeThread
GetFileAttributesW
LoadLibraryA
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
ReadFile
SetFileTime
SetEndOfFile
GetFileSize
GetFileTime
FindNextFileW
FindClose
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
FileTimeToDosDateTime
LoadLibraryExW
CreateDirectoryW
GetFullPathNameW
lstrlenW
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
SetCurrentDirectoryW
CopyFileW
GetTempFileNameW
MoveFileW
InterlockedExchangeAdd
lstrcatW
lstrcpyW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
FormatMessageW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetStdHandle
GetFileType
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
SetConsoleCtrlHandler
GetCurrentThread
GetStringTypeW
HeapReAlloc
GetDateFormatW
GetTimeFormatW
user32
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
GetParent
GetWindowThreadProcessId
GetWindow
FindWindowExW
IsWindowVisible
GetSystemMetrics
OpenDesktopW
CloseDesktop
ExitWindowsEx
FindWindowW
GetClassNameW
SwitchDesktop
GetDesktopWindow
WindowFromPoint
advapi32
SystemFunction036
ReportEventW
RegisterEventSourceW
DeregisterEventSource
EqualSid
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
LookupPrivilegeNameW
SetNamedSecurityInfoW
OpenProcessToken
FreeSid
GetTokenInformation
RegisterServiceCtrlHandlerExW
SetServiceStatus
StartServiceCtrlDispatcherW
ole32
CoInitializeSecurity
CoInitializeEx
rpcrt4
RpcServerRegisterIfEx
NdrServerCall2
NdrAsyncServerCall
RpcServerUseProtseqEpW
RpcServerListen
imagehlp
ImageRemoveCertificate
ImageEnumerateCertificates
Sections
.text Size: 813KB - Virtual size: 812KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msvcjmc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ