Static task
static1
Behavioral task
behavioral1
Sample
45b4ca12b62a8537b4f7f3ed56c325777d5a68cf51a7777e87814d29d76a2b78.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
45b4ca12b62a8537b4f7f3ed56c325777d5a68cf51a7777e87814d29d76a2b78.exe
Resource
win10v2004-20230703-en
General
-
Target
45b4ca12b62a8537b4f7f3ed56c325777d5a68cf51a7777e87814d29d76a2b78
-
Size
405KB
-
MD5
5607347fe0584a9a6690f56ef6600968
-
SHA1
ac60c6f6ddb11ba2f2fe27349499102a97452286
-
SHA256
45b4ca12b62a8537b4f7f3ed56c325777d5a68cf51a7777e87814d29d76a2b78
-
SHA512
36584d3dbf250710e05a9daf452efebdaf1e15471a3de202f445c3f5b693ae61159a29c44d6b3b25162484a195399a5d9066b141e980fd1335875fcdc32a4f19
-
SSDEEP
6144:tcqi00JXV3b8bA1LWZ8SW5KdydxlUwQa86Ulu30mwUP:O900JXdb8bA1KZWUS836TkmnP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45b4ca12b62a8537b4f7f3ed56c325777d5a68cf51a7777e87814d29d76a2b78
Files
-
45b4ca12b62a8537b4f7f3ed56c325777d5a68cf51a7777e87814d29d76a2b78.exe windows x86
03509368702189287d7df26fb828c01b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
CloseHandle
RemoveDirectoryW
CreateSymbolicLinkW
GetLastError
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
WinExec
CreateProcessW
FindFirstFileW
FindNextFileW
GetFullPathNameW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetModuleHandleW
LoadLibraryW
GetVersionExW
GetProcAddress
CreateFileW
GetFileAttributesW
GetVolumeInformationW
GetPrivateProfileStringW
DeleteFileW
GetModuleFileNameW
SetFileAttributesW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FindClose
InitializeCriticalSection
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
WriteFile
CopyFileW
ReadFile
OutputDebugStringW
GetPrivateProfileIntW
GetLocalTime
GetCurrentThreadId
GetSystemTimeAsFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrlenW
SetLastError
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
Sleep
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
CreateDirectoryW
RtlUnwind
GetCPInfo
LCMapStringW
LCMapStringA
GetStringTypeW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
ExitProcess
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
VirtualFree
VirtualAlloc
HeapCreate
GetModuleFileNameA
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
FlushFileBuffers
GetTimeZoneInformation
GetStringTypeA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LoadLibraryA
InitializeCriticalSectionAndSpinCount
CreateFileA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentDirectoryA
GetDriveTypeA
GetLocaleInfoW
user32
MessageBoxW
advapi32
OpenProcessToken
LookupPrivilegeValueW
OpenSCManagerW
StartServiceW
OpenServiceW
CreateServiceW
AdjustTokenPrivileges
shell32
ShellExecuteW
SHCreateDirectoryExW
shlwapi
PathIsDirectoryW
PathFileExistsW
Sections
.text Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ