Static task
static1
Behavioral task
behavioral1
Sample
babd56c423d608df41caa5c8f894ef55d9e563b889fd52521b21adeebcb9497b.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
babd56c423d608df41caa5c8f894ef55d9e563b889fd52521b21adeebcb9497b.exe
Resource
win10v2004-20230703-en
General
-
Target
babd56c423d608df41caa5c8f894ef55d9e563b889fd52521b21adeebcb9497b
-
Size
11.0MB
-
MD5
01a5cfd82f741886030244e6cc42add2
-
SHA1
e6c6d5d1f7bfa9f57b0f2d3ffc0847186e1a6df1
-
SHA256
babd56c423d608df41caa5c8f894ef55d9e563b889fd52521b21adeebcb9497b
-
SHA512
ef8683832e11bd13effac3a4a7e1624508f81f92ad4f25332404e5aa66532726c91795463606ad64e257fc90575442c1ea36da3d94b35975a1ebb402f5d2d547
-
SSDEEP
196608:SKusvqoMM7fBg2MqoMM7fBg2MqoMM7fBg2MqoMM7fBg2:fusvW2MW2MW2MW2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource babd56c423d608df41caa5c8f894ef55d9e563b889fd52521b21adeebcb9497b
Files
-
babd56c423d608df41caa5c8f894ef55d9e563b889fd52521b21adeebcb9497b.exe windows x86
4a53ced9024325e975b107df342280a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
CreateProcessW
UnmapViewOfFile
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
ProcessIdToSessionId
Process32NextW
GetModuleHandleW
GetCurrentProcess
GetLongPathNameW
Sleep
GetProcAddress
LoadLibraryW
WaitForSingleObject
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetConsoleMode
GetConsoleCP
InterlockedExchange
SetConsoleCtrlHandler
FatalAppExitA
GetLocaleInfoW
SetEvent
FlushViewOfFile
MapViewOfFile
ResetEvent
CreateFileMappingW
CreateEventW
SetFilePointer
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleFileNameW
WriteFile
GetLastError
CloseHandle
ReadFile
GetFileSize
CreateFileW
GetTimeZoneInformation
GetStringTypeW
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
LCMapStringW
GetCurrentThread
SetLastError
TlsFree
TlsAlloc
CreateMutexW
GetLocalTime
MoveFileW
ReleaseMutex
OutputDebugStringW
CopyFileW
DeleteFileW
OpenMutexW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
MultiByteToWideChar
GetCurrentProcessId
GetUserDefaultLangID
FlushFileBuffers
MoveFileExW
LoadLibraryExW
InterlockedDecrement
LoadLibraryA
IsBadStringPtrW
IsBadReadPtr
WideCharToMultiByte
OutputDebugStringA
FindFirstFileW
VirtualQuery
SetFilePointerEx
GetLogicalDriveStringsW
CreateDirectoryW
GetFileAttributesW
FindClose
RemoveDirectoryW
QueryDosDeviceW
FindNextFileW
SetFileAttributesW
FreeLibrary
Thread32First
GetVersionExW
Thread32Next
GetSystemInfo
FileTimeToSystemTime
FileTimeToLocalFileTime
SystemTimeToFileTime
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetFileSizeEx
CreateFileA
DeviceIoControl
GetModuleFileNameA
GetDiskFreeSpaceExW
lstrlenA
LocalFree
lstrlenW
RaiseException
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
lstrcpyA
lstrcatA
SetEndOfFile
MoveFileWithProgressW
ReplaceFileW
DuplicateHandle
GetFileInformationByHandle
OpenFileMappingW
ResumeThread
GetFileType
VirtualProtect
IsBadWritePtr
GetFileTime
SetFileTime
CopyFileExW
RtlMoveMemory
SetThreadContext
GetThreadContext
GetCurrentThreadId
SuspendThread
OpenThread
SwitchToThread
HeapCreate
TlsGetValue
TlsSetValue
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
Module32FirstW
Module32NextW
CreateRemoteThread
VirtualFree
VirtualAlloc
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetSystemTimeAsFileTime
GetTimeFormatW
GetDateFormatW
GetTimeFormatA
GetDateFormatA
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
ExitProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
user32
RegisterClassExW
CreateWindowExW
LoadIconW
GetClipboardData
SetClipboardData
ShowWindow
IsWindowVisible
InternalGetWindowText
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
UpdateWindow
DialogBoxParamW
DestroyWindow
DefWindowProcW
BeginPaint
EndPaint
PostQuitMessage
EndDialog
MessageBoxW
GetClassNameW
GetForegroundWindow
GetWindowTextW
LoadCursorW
GetDlgItem
advapi32
AdjustTokenPrivileges
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
StartServiceW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegEnumValueW
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegEnumKeyW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
RegCloseKey
RegFlushKey
RegCreateKeyExW
OpenProcessToken
LookupPrivilegeValueW
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
CommandLineToArgvW
SHGetSpecialFolderPathW
psapi
GetModuleFileNameExW
EnumProcessModules
GetMappedFileNameW
GetModuleInformation
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
shlwapi
StrStrIW
PathFileExistsW
PathMatchSpecW
StrChrW
dbghelp
ImageDirectoryEntryToData
ole32
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
oleaut32
GetErrorInfo
SysStringByteLen
VariantChangeType
SysAllocString
SysFreeString
VariantClear
VariantInit
SetErrorInfo
CreateErrorInfo
SysAllocStringByteLen
Sections
.text Size: 788KB - Virtual size: 788KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
pgdate Size: 2.5MB - Virtual size: 2.5MB
pgdate Size: 2.5MB - Virtual size: 2.5MB
pgdate Size: 2.5MB - Virtual size: 2.5MB
pgdate Size: 2.5MB - Virtual size: 2.5MB