Static task
static1
Behavioral task
behavioral1
Sample
LaunchWinApp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
LaunchWinApp.exe
Resource
win10v2004-20230703-en
General
-
Target
LaunchWinApp.exe
-
Size
54KB
-
MD5
1e0e8ade4b947932db9cee920428d14a
-
SHA1
50070cf154ca494681e03795bdfdb1ee720fadf5
-
SHA256
26c3bc7f8c1fe15e2cb650b38b4579499d8ec9476af3410336ac16812c704840
-
SHA512
1a40a14a587248e26bf4b8057eac8acbee2ac055785db47c568fdf6746ad9a6b0b3727590327a564dcc7f9e16e7a8b1e30a56da780b7157adacd6ad64764410e
-
SSDEEP
1536:j+4i33hSu92p0u+tdoxUHlNLchwHp2IyEAc:j+R3h2pX+tSxUFNLc+oJx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource LaunchWinApp.exe
Files
-
LaunchWinApp.exe.exe windows x86
5967658220e6e42c8b5a4216711c6075
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
EventSetInformation
EventRegister
EventWriteTransfer
EventUnregister
kernel32
GetModuleFileNameA
InitOnceBeginInitialize
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
GetCommandLineW
GetCurrentProcess
ReleaseSemaphore
GetModuleHandleExW
K32GetModuleFileNameExW
LeaveCriticalSection
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
WaitForSingleObject
GetCurrentThreadId
ReleaseMutex
K32EnumProcessModulesEx
OpenProcess
FormatMessageW
GetLastError
ReleaseSRWLockExclusive
OutputDebugStringW
CloseThreadpoolTimer
InitOnceComplete
AcquireSRWLockExclusive
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
SetThreadpoolTimer
ReleaseSRWLockShared
CreateThreadpoolTimer
HeapAlloc
GetProcAddress
CreateMutexExW
LocalFree
AcquireSRWLockShared
DeleteCriticalSection
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
DebugBreak
IsDebuggerPresent
msvcrt
_onexit
__dllonexit
_unlock
_purecall
memcmp
_except_handler4_common
_lock
?terminate@@YAXXZ
_wcmdln
memcpy_s
_initterm
__setusermatherr
_controlfp
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
_vsnwprintf
memmove_s
_vsnprintf_s
??3@YAXPAX@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
__p__fmode
??1type_info@@UAE@XZ
memmove
memcpy
__CxxFrameHandler3
??0exception@@QAE@ABV0@@Z
malloc
_callnewh
??0exception@@QAE@ABQBD@Z
??0exception@@QAE@ABQBDH@Z
?what@exception@@UBEPBDXZ
_CxxThrowException
memset
api-ms-win-core-shlwapi-legacy-l1-1-0
PathFindExtensionW
api-ms-win-core-com-l1-1-0
CoCreateFreeThreadedMarshaler
CoTaskMemFree
api-ms-win-core-winrt-l1-1-0
RoUninitialize
RoInitialize
oleaut32
SysFreeString
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-processthreads-l1-1-0
GetStartupInfoW
TerminateProcess
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetSystemTimeAsFileTime
iertutil
CreateUri
ntdll
NtQueryInformationProcess
shell32
CommandLineToArgvW
ShellExecuteExW
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ