Behavioral task
behavioral1
Sample
75f67567283f4ef8ea5da5280c8e84b7c52b02989eb2673938fe4b7925ade7b6.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
75f67567283f4ef8ea5da5280c8e84b7c52b02989eb2673938fe4b7925ade7b6.exe
Resource
win10v2004-20230703-en
General
-
Target
75f67567283f4ef8ea5da5280c8e84b7c52b02989eb2673938fe4b7925ade7b6
-
Size
10.2MB
-
MD5
c8311c30b23b68b2d202f4ab8e1e9fc2
-
SHA1
c4f1075c8fde084d18c364c3f00e63a20eddf656
-
SHA256
75f67567283f4ef8ea5da5280c8e84b7c52b02989eb2673938fe4b7925ade7b6
-
SHA512
cedca2a5146ab0c47c17cfb9b4391aac4af065d83c81c4d083cabd9aeb1b412953175b404d379f05173131a2176d70b80921772a0664f6cb3b76ba646b62ae67
-
SSDEEP
196608:3aH8/H607NNHcIiRGpvx9TNJJ8MquSsl2moYQ8WD/Vt3T0J3GG:J6OiYZ9TNvQsl20
Malware Config
Signatures
-
resource yara_rule sample detect_ak_stuff -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75f67567283f4ef8ea5da5280c8e84b7c52b02989eb2673938fe4b7925ade7b6
Files
-
75f67567283f4ef8ea5da5280c8e84b7c52b02989eb2673938fe4b7925ade7b6.exe windows x86
3ae20c0fa8048428377cae25a3e4e091
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostbyaddr
ioctlsocket
WSACleanup
WSASetLastError
__WSAFDIsSet
select
WSAIoctl
getsockname
ntohs
bind
getsockopt
getpeername
freeaddrinfo
getaddrinfo
sendto
recvfrom
gethostbyname
inet_ntoa
send
closesocket
shutdown
htonl
htons
WSAGetLastError
WSAStartup
recv
connect
inet_addr
setsockopt
gethostname
socket
accept
listen
wininet
InternetCloseHandle
InternetReadFile
InternetOpenA
InternetOpenUrlA
psapi
GetModuleFileNameExA
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
iphlpapi
GetAdaptersAddresses
setupapi
SetupDiGetDeviceRegistryPropertyA
SetupDiGetDeviceInstanceIdA
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
kernel32
CloseHandle
GetTickCount
FindFirstFileA
FindClose
FindNextFileA
Sleep
GetDriveTypeA
GetModuleHandleA
TerminateProcess
GetCurrentProcess
CreateMutexA
GetLastError
SetErrorMode
DeleteFileA
GlobalAlloc
InterlockedExchange
MultiByteToWideChar
WideCharToMultiByte
LoadResource
SizeofResource
FindResourceA
lstrlenA
GetProcAddress
GetModuleHandleW
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
GetTempPathA
GetSystemDirectoryA
SetFileAttributesA
FreeResource
GetVersionExA
GetLocalTime
GlobalLock
GlobalUnlock
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
WaitForSingleObject
ReleaseMutex
LoadLibraryA
VirtualAlloc
VirtualFree
SetLastError
HeapAlloc
GetProcessHeap
HeapFree
CreateProcessA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
ReadFile
CreateDirectoryA
IsWow64Process
GetCurrentDirectoryA
SetCurrentDirectoryA
GlobalFree
FileTimeToLocalFileTime
FileTimeToSystemTime
LeaveCriticalSection
lstrcatA
GetFullPathNameA
EnterCriticalSection
InterlockedDecrement
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCurrentThreadId
WriteFile
GetSystemTimeAsFileTime
GetFileType
SetFilePointer
HeapReAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapSize
ExitProcess
GetTimeFormatA
GetDateFormatA
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GetStdHandle
HeapCreate
HeapDestroy
SetStdHandle
GetConsoleCP
GetConsoleMode
SetEndOfFile
SetHandleCount
FlushFileBuffers
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
SetConsoleCtrlHandler
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileW
CompareStringA
CompareStringW
SetEnvironmentVariableA
DeleteCriticalSection
FreeLibrary
InitializeCriticalSection
GetModuleFileNameA
CopyFileA
CreateThread
CreateFileA
InterlockedIncrement
GetStringTypeExA
InterlockedCompareExchange
SleepEx
FormatMessageA
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
GetVersion
GlobalMemoryStatus
FlushConsoleInputBuffer
LocalFree
GetFileInformationByHandle
ReadConsoleInputA
SetConsoleMode
lstrcpyA
user32
GetParent
GetWindowRect
ExitWindowsEx
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
FindWindowExA
EndDialog
DefWindowProcA
GetDesktopWindow
PostMessageA
GetWindowTextA
LoadStringA
FindWindowA
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxA
SetLastErrorEx
EndPaint
GetClientRect
GetSysColor
BeginPaint
SetFocus
MessageBeep
GetFocus
RegisterClassExA
SetDlgItemTextA
GetClassNameA
GetForegroundWindow
PostQuitMessage
UnregisterHotKey
KillTimer
RegisterDeviceNotificationA
SetTimer
GetWindowThreadProcessId
SetWindowPos
SetWindowTextA
DrawTextA
GetSystemMetrics
DialogBoxIndirectParamA
SendMessageA
FindWindowExW
GetWindowLongA
EnumWindows
LoadIconA
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExW
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExW
RegDeleteValueW
CryptDestroyHash
CryptReleaseContext
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptSetKeyParam
CryptEncrypt
CryptDecrypt
RegOpenKeyExA
RegSetValueExA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
shell32
SHFileOperationA
ShellExecuteA
gdi32
SetBkColor
CreateFontIndirectA
SetBkMode
SelectObject
DeleteDC
DeleteObject
gdiplus
GdiplusShutdown
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
winmm
mciSendStringA
wldap32
ord32
ord35
ord30
ord79
ord200
ord33
ord301
ord27
ord41
ord46
ord211
ord26
ord50
ord60
ord143
ord22
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 380KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14.3MB - Virtual size: 14.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ