Static task
static1
Behavioral task
behavioral1
Sample
37b63f0a21b28dd8edb4a4a027bfa187ae50b35be9cfc748ec04607960792b9b.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
37b63f0a21b28dd8edb4a4a027bfa187ae50b35be9cfc748ec04607960792b9b.exe
Resource
win10v2004-20230703-en
General
-
Target
37b63f0a21b28dd8edb4a4a027bfa187ae50b35be9cfc748ec04607960792b9b
-
Size
948KB
-
MD5
027189b50b75f10d3bc24d74989b73af
-
SHA1
ed441c3cbe89a99cd4d504436646b30cc78c77c7
-
SHA256
37b63f0a21b28dd8edb4a4a027bfa187ae50b35be9cfc748ec04607960792b9b
-
SHA512
82c2754573e41aa6ca3df4ea1bba0a780dfbf5c806b12870a0eaf9fbaa9e48bc5e020cb9e96e4850e50badcd845c613e4b03797617febde7bac938b43e804245
-
SSDEEP
24576:RDaEUqrxVi6+qwZP62byGtTf2qEp8zcF7CYaQxV:RDaEU2i6662vTlE+cFlaQx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37b63f0a21b28dd8edb4a4a027bfa187ae50b35be9cfc748ec04607960792b9b
Files
-
37b63f0a21b28dd8edb4a4a027bfa187ae50b35be9cfc748ec04607960792b9b.exe windows x64
fdef4914be2d327513785a1a1d33ad33
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
GlobalFree
CreateProcessA
ProcessIdToSessionId
OpenProcess
VirtualAllocEx
lstrcmpiW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemInfo
GetVersionExW
GetFileAttributesA
PeekNamedPipe
WaitForSingleObject
GetProcessTimes
GetModuleHandleA
GetModuleHandleW
GlobalAlloc
K32GetModuleFileNameExA
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
LocalFileTimeToFileTime
SetFilePointer
SetFileTime
GetCurrentDirectoryA
DeleteFileA
FindFirstFileA
FindNextFileA
GetTempPathA
SetEvent
ReleaseMutex
CreateMutexW
CreateEventA
OpenEventA
GetCurrentThreadId
GetSystemDirectoryA
GetWindowsDirectoryA
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
IsBadReadPtr
OpenThread
SuspendThread
ResumeThread
GetThreadId
GetThreadContext
SetThreadContext
GetTickCount
VirtualProtectEx
WriteProcessMemory
Wow64GetThreadContext
Wow64SetThreadContext
Wow64SuspendThread
QueryThreadCycleTime
Thread32First
Thread32Next
SetEnvironmentVariableW
HeapAlloc
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
GetFileSizeEx
FlushFileBuffers
GetLastError
DecodePointer
WideCharToMultiByte
MultiByteToWideChar
SystemTimeToFileTime
GetLocalTime
CreateProcessW
GetCurrentProcess
Sleep
CreatePipe
SetLastError
SetHandleInformation
DuplicateHandle
CloseHandle
WriteFile
ReadFile
GetFullPathNameW
GetFileAttributesW
FindNextFileW
SetFilePointerEx
ReadConsoleW
SetEndOfFile
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
GetFileType
WriteConsoleW
RtlUnwind
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwindEx
RtlPcToFileHeader
RaiseException
OutputDebugStringW
InitializeSListHead
GetCurrentProcessId
GetStartupInfoW
IsDebuggerPresent
CreateEventW
ResetEvent
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetStringTypeW
LCMapStringEx
EncodePointer
LeaveCriticalSection
EnterCriticalSection
FindFirstFileW
FindClose
FreeEnvironmentStringsW
GetStdHandle
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForSingleObjectEx
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
user32
GetSystemMetrics
TranslateMessage
DispatchMessageW
LoadAcceleratorsW
TranslateAcceleratorW
GetMessageW
wsprintfW
advapi32
LookupAccountSidA
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
LookupAccountSidW
RegCloseKey
LookupPrivilegeValueW
GetTokenInformation
DuplicateTokenEx
AdjustTokenPrivileges
CreateProcessAsUserA
OpenProcessToken
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CoCreateGuid
ws2_32
ntohs
ntohl
listen
recv
htons
htonl
getsockopt
getsockname
getpeername
ioctlsocket
connect
closesocket
bind
accept
__WSAFDIsSet
recvfrom
select
send
sendto
setsockopt
WSAStartup
WSAGetLastError
gethostbyname
gethostname
inet_addr
WSACleanup
inet_ntoa
socket
shutdown
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
winhttp
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpReadData
WinHttpOpenRequest
WinHttpSetTimeouts
WinHttpSetOption
WinHttpQueryDataAvailable
WinHttpWriteData
wtsapi32
WTSEnumerateSessionsW
WTSFreeMemory
WTSQueryUserToken
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
iphlpapi
GetAdaptersInfo
GetAdaptersAddresses
GetIpNetTable
Sections
.text Size: 517KB - Virtual size: 517KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 242KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ