Static task
static1
Behavioral task
behavioral1
Sample
9532d7722d7f75563cc343190a0479e7c468994f94f7b51c38fcb15e1c0a8bf8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9532d7722d7f75563cc343190a0479e7c468994f94f7b51c38fcb15e1c0a8bf8.exe
Resource
win10v2004-20230703-en
General
-
Target
9532d7722d7f75563cc343190a0479e7c468994f94f7b51c38fcb15e1c0a8bf8
-
Size
74KB
-
MD5
ab9da51db16c9d56ac3f9fe8753c8950
-
SHA1
7efbf03cdad92714ba9e795af15902158898b9db
-
SHA256
9532d7722d7f75563cc343190a0479e7c468994f94f7b51c38fcb15e1c0a8bf8
-
SHA512
4c54d091dc50500508573ecb9205cc90516da07bc661614261f99a9a04e1b67c5b2f5db1037cc8dea7dcc148d97395c47e8c5a5d983d9c8f9a16bd1f44f33066
-
SSDEEP
384:SR6bXcKQbHg+hzWZ7gdoKRtbO1ylhXlIBPEyEr/urrrDp7VbbFaDrrrfOqvspSDP:Ysc1bAuzUg+EXoDo9wGd/92c7h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9532d7722d7f75563cc343190a0479e7c468994f94f7b51c38fcb15e1c0a8bf8
Files
-
9532d7722d7f75563cc343190a0479e7c468994f94f7b51c38fcb15e1c0a8bf8.exe windows x64
35b589cc7fd2f3106a21d1286c1a55ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
RtlLookupFunctionEntry
ConnectNamedPipe
GetComputerNameW
CreateThread
CloseHandle
GetCurrentThread
GetLastError
CreateEventW
GetSystemDirectoryW
WaitForSingleObject
CreateNamedPipeW
GetCurrentProcess
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
RtlCaptureContext
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
advapi32
GetTokenInformation
AdjustTokenPrivileges
SetTokenInformation
LookupPrivilegeNameW
OpenProcessToken
ImpersonateNamedPipeClient
InitializeSecurityDescriptor
CreateProcessAsUserW
ConvertStringSecurityDescriptorToSecurityDescriptorW
DuplicateTokenEx
OpenThreadToken
rpcrt4
UuidCreate
NdrClientCall3
UuidToStringW
RpcBindingFromStringBindingW
RpcStringBindingComposeW
RpcBindingFree
RpcStringFreeW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
vcruntime140
memcpy
__C_specific_handler
__current_exception
memset
__current_exception_context
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vswprintf
__p__commode
__stdio_common_vfwprintf
fflush
__acrt_iob_func
api-ms-win-crt-string-l1-1-0
_wcsicmp
api-ms-win-crt-convert-l1-1-0
wcstoul
api-ms-win-crt-heap-l1-1-0
_set_new_mode
malloc
free
api-ms-win-crt-runtime-l1-1-0
_c_exit
_cexit
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
__p___wargv
_set_app_type
__p___argc
_exit
exit
_register_thread_local_exe_atexit_callback
_initterm
_get_initial_wide_environment
_initialize_wide_environment
_configure_wide_argv
_initterm_e
_seh_filter_exe
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ