Static task
static1
Behavioral task
behavioral1
Sample
447ae764f43221465732b510bb3ddc4cc7067105a455d6419954a2d645dd7e58.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
447ae764f43221465732b510bb3ddc4cc7067105a455d6419954a2d645dd7e58.exe
Resource
win10v2004-20230703-en
General
-
Target
447ae764f43221465732b510bb3ddc4cc7067105a455d6419954a2d645dd7e58
-
Size
26KB
-
MD5
45cb3e36ea032fff8ce2472bd6a94d5e
-
SHA1
94f5b4d3eec9491b0d7c2704bc3e2ca96c3ff504
-
SHA256
447ae764f43221465732b510bb3ddc4cc7067105a455d6419954a2d645dd7e58
-
SHA512
4430b8e8c830cdeddc9c9fd8e8ad8d28c6c3b5628d4e378c8b070efe5d4f58feb3fe9a28a54115a38db3f648397a49dc3e58a3e6ffb458b7d7f28f6caa826c5f
-
SSDEEP
384:/VCUBdQ9r18K3Wi9SQdVOpAdoKRtb6j5alhYNkA:N5Y9d3/3d0jwZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 447ae764f43221465732b510bb3ddc4cc7067105a455d6419954a2d645dd7e58
Files
-
447ae764f43221465732b510bb3ddc4cc7067105a455d6419954a2d645dd7e58.exe windows x64
35b589cc7fd2f3106a21d1286c1a55ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
RtlLookupFunctionEntry
ConnectNamedPipe
GetComputerNameW
CreateThread
CloseHandle
GetCurrentThread
GetLastError
CreateEventW
GetSystemDirectoryW
WaitForSingleObject
CreateNamedPipeW
GetCurrentProcess
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
RtlCaptureContext
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
advapi32
GetTokenInformation
AdjustTokenPrivileges
SetTokenInformation
LookupPrivilegeNameW
OpenProcessToken
ImpersonateNamedPipeClient
InitializeSecurityDescriptor
CreateProcessAsUserW
ConvertStringSecurityDescriptorToSecurityDescriptorW
DuplicateTokenEx
OpenThreadToken
rpcrt4
UuidCreate
NdrClientCall3
UuidToStringW
RpcBindingFromStringBindingW
RpcStringBindingComposeW
RpcBindingFree
RpcStringFreeW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
vcruntime140
memcpy
__C_specific_handler
__current_exception
memset
__current_exception_context
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vswprintf
__p__commode
__stdio_common_vfwprintf
fflush
__acrt_iob_func
api-ms-win-crt-string-l1-1-0
_wcsicmp
api-ms-win-crt-convert-l1-1-0
wcstoul
api-ms-win-crt-heap-l1-1-0
_set_new_mode
malloc
free
api-ms-win-crt-runtime-l1-1-0
_c_exit
_cexit
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
__p___wargv
_set_app_type
__p___argc
_exit
exit
_register_thread_local_exe_atexit_callback
_initterm
_get_initial_wide_environment
_initialize_wide_environment
_configure_wide_argv
_initterm_e
_seh_filter_exe
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ