Static task
static1
Behavioral task
behavioral1
Sample
806014bd0fc72d05304106730fe0e9ac70f0c0a81aa4e6bd7a14dcaa9242d4f3.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
806014bd0fc72d05304106730fe0e9ac70f0c0a81aa4e6bd7a14dcaa9242d4f3.exe
Resource
win10v2004-20230703-en
General
-
Target
806014bd0fc72d05304106730fe0e9ac70f0c0a81aa4e6bd7a14dcaa9242d4f3
-
Size
350KB
-
MD5
7b005e9583de65f1672c50ff06d58aec
-
SHA1
5e685349463720deff7b185f3a46d7031735f729
-
SHA256
806014bd0fc72d05304106730fe0e9ac70f0c0a81aa4e6bd7a14dcaa9242d4f3
-
SHA512
252505c69479db03eb7933e140d874ee5746c9330301a9394a47e077117d312de8ae60848b67af048f542098d5a718908f6b135f2b3203f000d6a1e4efff00c9
-
SSDEEP
6144:pgD+McNJr9Lr7clb1QkyVF7cEOkCybEaQRXr9HNdvOa:iN69v7clb1QkGOkx2LIa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 806014bd0fc72d05304106730fe0e9ac70f0c0a81aa4e6bd7a14dcaa9242d4f3
Files
-
806014bd0fc72d05304106730fe0e9ac70f0c0a81aa4e6bd7a14dcaa9242d4f3.exe windows x86
cbf7fc27b3115fc1c9cb34bb9ad1b785
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
SetCurrentDirectoryW
ProcessIdToSessionId
GetCurrentProcessId
Sleep
CreateProcessW
TerminateProcess
GetCurrentThreadId
LoadLibraryA
GetVersionExW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
WideCharToMultiByte
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetTickCount
DeleteCriticalSection
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
IsValidCodePage
VirtualQuery
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetCurrentThread
SetThreadPriority
SetPriorityClass
GetModuleFileNameW
ExitProcess
SetUnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
HeapCreate
InterlockedDecrement
SetLastError
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetLocaleInfoA
GetModuleHandleW
GetCurrentProcess
CloseHandle
OpenMutexW
GetLastError
InitializeCriticalSection
CreateMutexW
GetStringTypeW
GetStringTypeA
InterlockedIncrement
ReadFile
SetFilePointer
VirtualAllocEx
GetSystemInfo
GetModuleHandleA
WriteProcessMemory
VirtualFree
CreateRemoteThread
TerminateThread
VirtualAlloc
GetProcessId
WriteFile
SystemTimeToFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
GlobalAlloc
GlobalFree
QueryPerformanceCounter
CreateFileA
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InitializeCriticalSectionAndSpinCount
user32
GetWindowThreadProcessId
FindWindowExW
FindWindowW
SetThreadDesktop
OpenDesktopW
GetThreadDesktop
wsprintfW
advapi32
AllocateAndInitializeSid
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
FreeSid
CheckTokenMembership
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateProcessAsUserW
shell32
ShellExecuteExW
ShellExecuteW
shlwapi
PathFileExistsW
StrCmpIW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
wininet
InternetCloseHandle
HttpSendRequestW
InternetSetOptionW
InternetQueryOptionW
InternetSetOptionA
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetReadFile
dnsapi
DnsFree
DnsQuery_W
iphlpapi
GetIpNetTable
GetAdaptersInfo
SendARP
ws2_32
htonl
inet_ntoa
ntohl
inet_addr
Sections
.text Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ