Static task
static1
Behavioral task
behavioral1
Sample
28ae5e122c771d6e259112b5fb6a6bb14b8dc415415470d782f23f45a60bfef6.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
28ae5e122c771d6e259112b5fb6a6bb14b8dc415415470d782f23f45a60bfef6.exe
Resource
win10v2004-20230703-en
General
-
Target
28ae5e122c771d6e259112b5fb6a6bb14b8dc415415470d782f23f45a60bfef6
-
Size
3.9MB
-
MD5
3303a984ad6fd1088bfa57950f2d7f7f
-
SHA1
628b917286539b880d340f5c692215dc32fd0e0d
-
SHA256
28ae5e122c771d6e259112b5fb6a6bb14b8dc415415470d782f23f45a60bfef6
-
SHA512
d671e0135a2e52a497311cedad54b3cc21caef7c5c5af5871f82d0d13435b3c5cf338f6107ae37aa476bf7a432e3ecdafce2ce7dcd11acf3fc98ebca8d28f538
-
SSDEEP
98304:cySQnjgm137kSDDF2GXlpllC14pooPzWfHdqdJg:nSQhkkDpXlpqG1zWfkdW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28ae5e122c771d6e259112b5fb6a6bb14b8dc415415470d782f23f45a60bfef6
Files
-
28ae5e122c771d6e259112b5fb6a6bb14b8dc415415470d782f23f45a60bfef6.exe windows x86
93ad6ade6d9f32d1b60efda1b7402353
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
ioctlsocket
shutdown
htonl
gethostbyname
getservbyname
send
recv
WSASetLastError
select
__WSAFDIsSet
WSAStartup
WSAGetLastError
WSACleanup
gethostname
sendto
recvfrom
listen
accept
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
wldap32
ord46
ord60
ord211
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord143
ord200
ord301
kernel32
GetTickCount
GetPrivateProfileIntW
WaitForSingleObject
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameW
GetTempPathW
CreateDirectoryW
FindFirstFileW
FindNextFileW
GetFileAttributesW
SetFileAttributesW
GetCurrentDirectoryW
WideCharToMultiByte
OpenFileMappingW
MapViewOfFile
GetLastError
CreateFileMappingW
UnmapViewOfFile
MulDiv
OutputDebugStringW
GetPrivateProfileStringW
MoveFileExW
OutputDebugStringA
GetCommandLineW
LoadLibraryW
VirtualAlloc
VirtualFree
GetModuleHandleA
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
CreateEventA
CreateSemaphoreA
AreFileApisANSI
MultiByteToWideChar
LoadLibraryExW
GetModuleFileNameA
LocalFree
FormatMessageA
FormatMessageW
GetCurrentProcessId
GetCurrentThreadId
SetLastError
SetFileTime
GetModuleHandleW
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
CreateDirectoryA
RemoveDirectoryA
RemoveDirectoryW
CreateFileW
SetFileAttributesA
DeleteFileA
MoveFileA
MoveFileW
FindClose
GetLogicalDriveStringsA
GetLogicalDriveStringsW
GetFileAttributesA
FindFirstFileA
FindNextFileA
GetFileSize
WriteFile
ReadFile
DeviceIoControl
SetEndOfFile
SetFilePointer
CreateFileA
GetFileInformationByHandle
GetDriveTypeA
GetDriveTypeW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetVolumeInformationA
GetCurrentProcess
CompareFileTime
TerminateProcess
GlobalMemoryStatus
GetSystemInfo
GetSystemTimeAsFileTime
FileTimeToDosDateTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
WaitForMultipleObjects
GetStdHandle
QueryPerformanceCounter
SetProcessAffinityMask
OpenEventA
OpenFileMappingA
GetProcessTimes
SetConsoleCtrlHandler
SetFileApisToOEM
GetConsoleScreenBufferInfo
GetConsoleMode
SetConsoleMode
OpenProcess
lstrcmpiW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
LockResource
LoadResource
SizeofResource
FindResourceW
GetDiskFreeSpaceExA
GetVersionExW
GetSystemDefaultLangID
GetLocaleInfoA
GetLocalTime
InitializeCriticalSectionEx
SleepEx
SystemTimeToFileTime
GetTickCount64
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetFileType
PeekNamedPipe
VerSetConditionMask
VerifyVersionInfoA
FlushConsoleInputBuffer
GetSystemTime
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
SetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetModuleHandleExW
ExitProcess
ReadConsoleInputA
SetFilePointerEx
HeapReAlloc
RaiseException
RtlUnwind
IsProcessorFeaturePresent
IsDebuggerPresent
SystemTimeToTzSpecificLocalTime
ExitThread
CreateThread
GetStringTypeW
DecodePointer
EncodePointer
AllocConsole
SetConsoleTitleA
FreeConsole
lstrlenA
IsDBCSLeadByte
GlobalUnlock
GlobalLock
GetNativeSystemInfo
CreateProcessA
MoveFileExA
CopyFileA
QueryDosDeviceA
GetShortPathNameA
HeapFree
HeapAlloc
CloseHandle
GetExitCodeProcess
Sleep
DeleteFileW
InitializeSListHead
WriteConsoleW
SetEnvironmentVariableA
GetFullPathNameW
WaitForMultipleObjectsEx
SetWaitableTimer
ResumeThread
CreateWaitableTimerA
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
GetCurrentThread
IsValidCodePage
GetTimeZoneInformation
ReadConsoleW
GetConsoleCP
GetEnvironmentStringsW
GetProcessHeap
GetOEMCP
FindFirstFileExW
FileTimeToSystemTime
GetACP
GetFileAttributesExW
VirtualQuery
GetThreadTimes
FlushFileBuffers
FreeEnvironmentStringsW
user32
GetProcessWindowStation
GetDesktopWindow
InvalidateRect
ClientToScreen
ReleaseCapture
SetCapture
CharLowerW
GetWindowThreadProcessId
PostMessageW
ExitWindowsEx
CharPrevExA
CharUpperW
CharUpperA
GetWindowRgn
DestroyWindow
SetWindowLongW
GetWindowLongW
GetUserObjectInformationW
LoadCursorW
DefWindowProcW
FindWindowW
GetWindowTextW
MessageBoxW
EndDialog
OffsetRect
MessageBoxA
SendMessageA
LoadIconW
SetWindowTextA
CreateWindowExW
MoveWindow
EnableWindow
wsprintfW
DrawTextA
ReleaseDC
DrawTextW
FillRect
GetClientRect
DialogBoxParamW
LoadStringW
SetWindowPos
GetSystemMetrics
GetWindowRect
ShowWindow
SetWindowTextW
SendMessageW
GetDlgItem
KillTimer
SetTimer
LoadBitmapW
OpenDesktopA
EnumDesktopWindows
CloseDesktop
PostMessageA
IsWindowVisible
OpenClipboard
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
GetForegroundWindow
SystemParametersInfoA
CharNextA
LoadStringA
RegisterClassExW
GetDC
gdi32
DeleteObject
GetTextExtentPointW
PtInRegion
CreateRectRgn
CreateDIBSection
CreateFontIndirectW
GetDeviceCaps
DeleteDC
BitBlt
SetTextColor
SetBkMode
CreateSolidBrush
SelectObject
CreateCompatibleDC
SetBitmapBits
CreateCompatibleBitmap
GetBitmapBits
GetObjectW
advapi32
AllocateAndInitializeSid
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegQueryInfoKeyA
RegOpenKeyA
RegEnumValueA
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
RegSetValueA
RegQueryValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
CheckTokenMembership
DuplicateTokenEx
LookupPrivilegeValueW
FreeSid
AdjustTokenPrivileges
GetFileSecurityW
LookupPrivilegeValueA
SetFileSecurityW
OpenProcessToken
shell32
SHGetPathFromIDListA
ShellExecuteExA
ShellExecuteA
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
CommandLineToArgvW
ShellExecuteW
SHGetFolderPathW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
ole32
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoCreateGuid
CoSetProxyBlanket
CoTaskMemFree
CoInitialize
oleaut32
SysStringLen
SysAllocString
VariantClear
VariantCopy
SysFreeString
SysAllocStringLen
powrprof
SetSuspendState
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
shlwapi
StrCpyNW
StrChrW
StrCmpW
StrCatW
StrRChrW
PathAppendA
PathRemoveFileSpecW
PathFileExistsA
PathIsDirectoryW
StrCpyW
PathFileExistsW
PathAppendW
netapi32
NetApiBufferFree
NetWkstaGetInfo
psapi
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
dbghelp
MiniDumpWriteDump
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 687KB - Virtual size: 687KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ