Static task
static1
Behavioral task
behavioral1
Sample
84ab784b5f42543dbe0b880b9a6ba38ad2bcb7acef43ac5230de6f8fcf285c30.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
84ab784b5f42543dbe0b880b9a6ba38ad2bcb7acef43ac5230de6f8fcf285c30.exe
Resource
win10v2004-20230703-en
General
-
Target
17b07b5e8bf1a6f38a2c2eda486c2834.bin
-
Size
2.2MB
-
MD5
b6d6ff528b5926a9c19fa40b0bd338b0
-
SHA1
a6f9de611aac7e234fdcb7390a9a420bae5deb83
-
SHA256
65d133372e7a5a1b642bc16268109e12668bdab8c6916db8faa4f527091a5310
-
SHA512
540bb146513a08dba6b9b918ba05e16de0128841e5ef1cb01f28d5e917fecdea7cd3674899f46624d4fd0c2b7fa0a5aff77db0105d457057b93ebbf47a0b297d
-
SSDEEP
49152:11c1M9pC4wGzoi0PEUvmm41Ih92tN/NX2V0kMf1RUoDruYD0OZ:11ca9Yu0sUeO9WNuQwo+YJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/84ab784b5f42543dbe0b880b9a6ba38ad2bcb7acef43ac5230de6f8fcf285c30.bin
Files
-
17b07b5e8bf1a6f38a2c2eda486c2834.bin.zip
Password: infected
-
84ab784b5f42543dbe0b880b9a6ba38ad2bcb7acef43ac5230de6f8fcf285c30.bin.exe windows x86
Password: infected
79dbe573912bfd2d08a3c01a29dfeaed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
uiautomationcore
UiaHostProviderFromHwnd
UiaReturnRawElementProvider
UiaRaiseAutomationPropertyChangedEvent
UiaRaiseAutomationEvent
UiaClientsAreListening
msimg32
AlphaBlend
rpcrt4
UuidToStringA
RpcStringFreeA
UuidCreate
ws2_32
bind
socket
freeaddrinfo
getaddrinfo
WSASetLastError
htons
WSACleanup
WSAStartup
connect
htonl
WSAGetLastError
gethostname
closesocket
shutdown
ntohl
getpeername
getsockname
getsockopt
ntohs
setsockopt
WSAIoctl
recvfrom
sendto
accept
listen
__WSAFDIsSet
select
ioctlsocket
send
recv
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
kernel32
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
WaitForSingleObject
RtlUnwind
ExitProcess
GetModuleHandleExW
GetStdHandle
GetFileType
GetModuleFileNameA
WriteConsoleW
ExitThread
ResumeThread
WriteFile
GetACP
SetConsoleCtrlHandler
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
OutputDebugStringA
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadFile
ReadConsoleW
SetFilePointerEx
GetTimeZoneInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
CreateThread
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
HeapSize
CreateFileW
SetEndOfFile
GetTickCount64
SleepEx
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
FormatMessageA
VerSetConditionMask
GetSystemDirectoryA
LoadLibraryA
VerifyVersionInfoA
CreateFileA
GetFileSizeEx
InitializeCriticalSection
GetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
DeleteFileW
FindFirstFileW
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
RemoveDirectoryW
SetFileAttributesW
SetFileTime
DeviceIoControl
MoveFileExW
AreFileApisANSI
OpenEventA
SetWaitableTimer
GetSystemInfo
CreateWaitableTimerA
DeactivateActCtx
ActivateActCtx
CreateActCtxW
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
lstrlenW
VirtualUnlock
ReleaseMutex
CreateMutexA
GlobalFree
GetExitCodeProcess
OpenThread
CreateFiber
VirtualQuery
MoveFileW
ConvertThreadToFiber
CreateFiberEx
WaitNamedPipeW
SetFileValidData
IsBadReadPtr
GlobalMemoryStatus
Module32NextW
VerifyVersionInfoW
SignalObjectAndWait
CreateTimerQueue
OutputDebugStringW
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetCurrentProcessId
ResetEvent
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
SetThreadPriority
MultiByteToWideChar
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
EncodePointer
GetExitCodeThread
SwitchToThread
Sleep
WaitForSingleObjectEx
DuplicateHandle
GetCurrentThreadId
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
WideCharToMultiByte
GetCurrentThread
GetCurrentProcess
LocalFree
OpenProcess
GetVersionExW
LocalAlloc
FindResourceW
LoadResource
LockResource
SizeofResource
CreateEventA
GetProcessHeap
HeapAlloc
CloseHandle
SetEvent
SystemTimeToFileTime
GetComputerNameW
lstrcpynA
GetFileSize
GetThreadContext
GetLocalTime
HeapFree
GetUserDefaultLangID
GetTickCount
FreeLibrary
GetModuleHandleW
DeleteCriticalSection
GetProcAddress
DecodePointer
LoadLibraryW
RaiseException
GetLastError
InitializeCriticalSectionEx
ConvertFiberToThread
ReadConsoleA
SetConsoleMode
GetOEMCP
Module32FirstW
Process32Next
DeleteFileA
FileTimeToSystemTime
GetTempPathA
CreateToolhelp32Snapshot
SwitchToFiber
SuspendThread
IsBadStringPtrA
Thread32First
GetCompressedFileSizeW
SetFilePointer
Thread32Next
GetProcessId
DeleteFiber
GetVolumeInformationW
SetNamedPipeHandleState
Process32First
IsBadWritePtr
RtlCaptureContext
GetShortPathNameW
GetDiskFreeSpaceW
user32
AllowSetForegroundWindow
GetDesktopWindow
MessageBoxA
GetDC
DrawTextW
GetWindowLongW
DefWindowProcW
AdjustWindowRectEx
GetWindowRect
DestroyWindow
SetWindowPos
MessageBoxW
CreateWindowExW
SendMessageW
GetSystemMetrics
SetWindowTextW
RegisterClassExW
ShowWindow
DispatchMessageW
SetTimer
PeekMessageW
TrackMouseEvent
TranslateMessage
LoadIconW
LoadCursorW
SetCapture
GetWindowDC
SetWindowLongW
UpdateLayeredWindow
PostQuitMessage
ReleaseCapture
InvalidateRect
IsIconic
ReleaseDC
GetCursorPos
BeginPaint
EndPaint
GetKeyState
GetUserObjectInformationW
ClientToScreen
PostMessageW
GetForegroundWindow
GetActiveWindow
GetShellWindow
GetWindowThreadProcessId
CharLowerA
SetFocus
MoveWindow
ScreenToClient
GetProcessWindowStation
gdi32
CreateDIBSection
GetObjectW
DeleteObject
AddFontMemResourceEx
EnumFontFamiliesExW
CreateFontW
GetStockObject
SetBkColor
RoundRect
SelectObject
GetLayout
SetLayout
DeleteDC
SetTextColor
SetBkMode
SetMapMode
SetTextAlign
CreateCompatibleDC
advapi32
GetTokenInformation
RegDeleteValueA
OpenServiceW
QueryServiceConfigW
OpenProcessToken
RegSetValueExA
RegCreateKeyExA
CryptEnumProvidersA
CryptSignHashA
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptAcquireContextW
ReportEventA
RegisterEventSourceA
DeregisterEventSource
RegGetValueW
RegSetValueExW
SetEntriesInAclW
ConvertSecurityDescriptorToStringSecurityDescriptorW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
GetFileSecurityW
MapGenericMask
BuildTrusteeWithSidW
RegQueryValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetUserNameW
DuplicateTokenEx
OpenSCManagerW
RegQueryValueExA
CloseServiceHandle
ConvertSidToStringSidA
RegCloseKey
RegOpenKeyExA
OpenThreadToken
DuplicateToken
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
AccessCheck
AllocateAndInitializeSid
shell32
SHGetFolderPathW
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteExW
CommandLineToArgvW
FindExecutableA
ole32
CoTaskMemFree
CoCreateInstance
wintrust
WinVerifyTrust
crypt32
CertOpenStore
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
CertAddCertificateContextToStore
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CryptMsgClose
CryptMsgGetParam
CertGetNameStringW
CertEnumCertificatesInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertFreeCertificateChainEngine
wininet
HttpSendRequestA
InternetCloseHandle
InternetSetStatusCallbackA
InternetOpenA
InternetReadFileExA
InternetSetCookieW
InternetSetOptionA
InternetCrackUrlA
HttpOpenRequestA
HttpQueryInfoA
InternetConnectA
winhttp
WinHttpCloseHandle
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpOpen
oleaut32
VariantClear
SysAllocString
SafeArrayCreateVector
SafeArrayPutElement
Sections
.text Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 474KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 526KB - Virtual size: 525KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ