Static task
static1
Behavioral task
behavioral1
Sample
23ab8eef2765cbca350f58e24c2ec276c90ad5001b47e974289653d3ea006a03.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
23ab8eef2765cbca350f58e24c2ec276c90ad5001b47e974289653d3ea006a03.exe
Resource
win10v2004-20230703-en
General
-
Target
23ab8eef2765cbca350f58e24c2ec276c90ad5001b47e974289653d3ea006a03
-
Size
258KB
-
MD5
544ef8ff4c0379e6e1b170a74c871420
-
SHA1
d74d11810b728040975593ada598dcc5e55c0474
-
SHA256
23ab8eef2765cbca350f58e24c2ec276c90ad5001b47e974289653d3ea006a03
-
SHA512
d061b05008e35cfde7ca878d95e57a2586cdb1ccb5c61d714079b9fc8c3432c68b72a9da328c39b5fc899cf24a0938a8c25290c24138f984ad2df5307148e34c
-
SSDEEP
6144:awSznn5cFHSDe84hIrCD8UmSeMFhoT3FFPs4zFfv:y5KyqxzaMFeTVVz5v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23ab8eef2765cbca350f58e24c2ec276c90ad5001b47e974289653d3ea006a03
Files
-
23ab8eef2765cbca350f58e24c2ec276c90ad5001b47e974289653d3ea006a03.exe windows x86
18e48fce92efead61c62b27e0f90f181
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileW
shlwapi
PathFileExistsW
ws2_32
WSAStartup
gethostname
inet_ntoa
WSACleanup
gethostbyname
netapi32
NetUserGetInfo
NetApiBufferFree
shell32
CommandLineToArgvW
ord680
advapi32
RegSetValueExA
RegOpenKeyExA
GetUserNameW
RegCloseKey
ole32
CoInitializeEx
CoGetObject
IIDFromString
kernel32
GetStringTypeW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
FlushFileBuffers
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetEnvironmentStringsW
QueryPerformanceCounter
FindFirstFileExA
FindClose
GetProcessHeap
ReadFile
GetModuleFileNameA
GetCommandLineW
VirtualAlloc
GetModuleFileNameW
CreateFileW
OpenProcess
CreateToolhelp32Snapshot
MultiByteToWideChar
Process32NextW
GetDiskFreeSpaceExW
lstrcatW
Process32FirstW
CloseHandle
LoadLibraryW
GetWindowsDirectoryW
GetProcAddress
GetFileSize
GetCurrentProcessId
lstrcmpiW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
DecodePointer
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
EncodePointer
RaiseException
GetLastError
RtlUnwind
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapValidate
GetSystemInfo
GetStdHandle
WriteFile
WideCharToMultiByte
GetCommandLineA
GetACP
CompareStringW
LCMapStringW
GetFileType
OutputDebugStringA
OutputDebugStringW
WriteConsoleW
WaitForSingleObjectEx
CreateThread
HeapFree
HeapReAlloc
HeapSize
HeapQueryInformation
Sections
.text Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ