Static task
static1
Behavioral task
behavioral1
Sample
Malicious_066ee1eaf667b5fd34db69c7c3b6f8bdcc299ef27db6c162a5a9bc87175ecbca.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Malicious_066ee1eaf667b5fd34db69c7c3b6f8bdcc299ef27db6c162a5a9bc87175ecbca.exe
Resource
win10v2004-20230703-en
General
-
Target
Malicious_066ee1eaf667b5fd34db69c7c3b6f8bdcc299ef27db6c162a5a9bc87175ecbca.dontrunthis
-
Size
3.7MB
-
MD5
cd0debde933bc23ee36d946a8e7c9c8f
-
SHA1
c4a31fb613031606aaf5ff7cc678510281f663b0
-
SHA256
376faac3bdafb42d8368029ba9389d155c0f61b6914a1ee3a75eeaf12cc56a23
-
SHA512
00c3b019e9963102706af822034ff7363f8be9338eb7c14d53a083b65be78083c6865f6a73d55031440524de96adb784f281e605cd43a0e4dd3e9d7153c7dbb8
-
SSDEEP
98304:aFmiyI8zYfOrwJHlqini6CqGQjxEKn2UVnDaa1LIj:KFk36zEK2UVDaa1LIj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Malicious_066ee1eaf667b5fd34db69c7c3b6f8bdcc299ef27db6c162a5a9bc87175ecbca.dontrunthis
Files
-
Malicious_066ee1eaf667b5fd34db69c7c3b6f8bdcc299ef27db6c162a5a9bc87175ecbca.dontrunthis.exe windows x86
e85589b10fa69d79a893d2e9c1152dfd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CertCreateCertificateContext
CertFreeCertificateContext
CertAddCertificateContextToStore
CertCloseStore
CertFindCertificateInStore
CertOpenStore
winhttp
WinHttpGetIEProxyConfigForCurrentUser
iphlpapi
GetAdaptersInfo
kernel32
QueryDepthSList
UnregisterWaitEx
AreFileApisANSI
ReadFile
TryEnterCriticalSection
HeapCreate
HeapFree
EnterCriticalSection
GetFullPathNameW
WriteFile
InterlockedCompareExchange
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
LeaveCriticalSection
InitializeCriticalSection
SetFilePointer
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetTempPathW
CreateMutexW
WaitForSingleObject
CreateFileW
GetFileAttributesW
GetCurrentThreadId
GetVersionExW
UnmapViewOfFile
HeapValidate
HeapSize
MultiByteToWideChar
Sleep
GetTempPathA
FormatMessageW
GetDiskFreeSpaceA
GetLastError
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
CreateFileA
LoadLibraryA
WaitForSingleObjectEx
GetVersionExA
DeleteFileA
DeleteFileW
HeapReAlloc
CloseHandle
GetSystemInfo
LoadLibraryW
HeapAlloc
HeapCompact
HeapDestroy
UnlockFile
GetProcAddress
CreateFileMappingA
LocalFree
LockFileEx
GetFileSize
DeleteCriticalSection
GetCurrentProcessId
GetProcessHeap
SystemTimeToFileTime
FreeLibrary
WideCharToMultiByte
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
InterlockedExchange
InterlockedDecrement
PostQueuedCompletionStatus
TlsAlloc
InterlockedExchangeAdd
InterlockedIncrement
TlsFree
FindFirstFileW
FindNextFileW
FindClose
OpenProcess
GetVersion
GetCurrentProcess
CreateDirectoryW
RemoveDirectoryW
GetModuleFileNameW
GetSystemDirectoryW
MoveFileExW
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
TlsGetValue
CreateIoCompletionPort
SetWaitableTimer
TlsSetValue
SetLastError
WaitForMultipleObjects
GetQueuedCompletionStatus
CreateToolhelp32Snapshot
TerminateThread
QueueUserAPC
VerSetConditionMask
GetComputerNameW
CopyFileW
VerifyVersionInfoW
SizeofResource
FreeResource
LockResource
LoadResource
FindResourceW
GetProcessId
SetFileAttributesW
Process32NextW
Process32FirstW
GetSystemPowerStatus
ProcessIdToSessionId
SetProcessShutdownParameters
ExitProcess
SetThreadExecutionState
TerminateProcess
DuplicateHandle
GetCurrentThread
CreateProcessW
GetModuleHandleW
VerifyVersionInfoA
SleepEx
ExpandEnvironmentStringsA
RaiseException
VirtualProtect
VirtualQuery
LoadLibraryExA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
SetEvent
ResetEvent
CreateEventW
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
GetStringTypeW
GetExitCodeThread
QueryPerformanceFrequency
EncodePointer
DecodePointer
QueueUserWorkItem
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCurrentDirectoryW
SetFilePointerEx
DeviceIoControl
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameA
GetStdHandle
GetACP
GetConsoleMode
ReadConsoleW
GetConsoleCP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
SetStdHandle
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
WriteConsoleW
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
VirtualAlloc
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 272KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ