Static task
static1
Behavioral task
behavioral1
Sample
87592c47b3859e60003b1bb278e09d4160418758085632488f2e288db1dd20c9.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
87592c47b3859e60003b1bb278e09d4160418758085632488f2e288db1dd20c9.exe
Resource
win10v2004-20230824-en
General
-
Target
87592c47b3859e60003b1bb278e09d4160418758085632488f2e288db1dd20c9
-
Size
4.9MB
-
MD5
865c782d75c34f13124959ed5acf4944
-
SHA1
105a3c8d9931901bbb1e3236e63925a2be5a29fe
-
SHA256
87592c47b3859e60003b1bb278e09d4160418758085632488f2e288db1dd20c9
-
SHA512
978fa8a90b5011a89b7070abeeae1f4235d7c1227d33dbef2f5480363b7d971dbe042bdf701eb444ce01fb0c4a6861888b44641021ca6a4887d5895984bb5ba7
-
SSDEEP
98304:aa4LfwUQhux2XeF+Sn+udjwWDryxEdDAQf2T3de7ssfa:6FQEIzSn+uJryxE9DOY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 87592c47b3859e60003b1bb278e09d4160418758085632488f2e288db1dd20c9
Files
-
87592c47b3859e60003b1bb278e09d4160418758085632488f2e288db1dd20c9.exe windows x86
d09738a9e1682b13be0a5e40b2bcb1a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
ExitThread
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
WriteProcessMemory
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
VirtualProtectEx
VirtualProtect
VirtualFree
VirtualAllocEx
VirtualAlloc
SystemTimeToFileTime
SizeofResource
SetThreadContext
SetLastError
SetFilePointer
SetFileAttributesW
SetFileAttributesA
SetEvent
SetErrorMode
SetEndOfFile
SetCurrentDirectoryW
SetCurrentDirectoryA
ResetEvent
RemoveDirectoryW
RemoveDirectoryA
ReadProcessMemory
ReadFile
RaiseException
QueryDosDeviceW
PostQueuedCompletionStatus
MultiByteToWideChar
LockResource
LoadResource
LoadLibraryW
LoadLibraryA
LeaveCriticalSection
IsBadWritePtr
IsBadStringPtrW
IsBadReadPtr
InitializeCriticalSection
GetWindowsDirectoryW
GetWindowsDirectoryA
GetVersionExA
GetVersion
GetThreadLocale
GetThreadContext
GetTempPathW
GetTempPathA
GetTempFileNameW
GetTempFileNameA
GetSystemDirectoryW
GetSystemDirectoryA
GetStringTypeExW
GetStringTypeExA
GetStdHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLogicalDriveStringsW
GetLocaleInfoW
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameW
GetFullPathNameA
GetFileSize
GetFileAttributesW
GetFileAttributesA
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCurrentDirectoryA
GetCPInfo
GetACP
FreeResource
FreeLibrary
FormatMessageA
FlushInstructionCache
FlushFileBuffers
FindResourceW
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitProcess
EnumCalendarInfoA
EnterCriticalSection
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateRemoteThread
CreateFileW
CreateFileA
CreateEventA
CreateDirectoryW
CreateDirectoryA
CompareStringW
CompareStringA
CloseHandle
Sleep
ActivateActCtx
CreateActCtxW
QueryDosDeviceW
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
MessageBoxA
LoadStringA
GetSystemMetrics
CharUpperBuffW
CharUpperW
CharLowerBuffW
CharLowerW
CharNextA
CharLowerA
CharUpperA
CharToOemA
GetProcessWindowStation
GetUserObjectInformationW
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
GetErrorInfo
SysFreeString
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
ole32
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
ntdll
RtlInitUnicodeString
RtlFreeUnicodeString
RtlFormatCurrentUserKeyPath
RtlDosPathNameToNtPathName_U
ZwProtectVirtualMemory
LdrGetProcedureAddress
RtlFreeUnicodeString
RtlInitAnsiString
RtlAnsiStringToUnicodeString
LdrLoadDll
shfolder
SHGetFolderPathW
SHGetFolderPathA
shlwapi
PathMatchSpecW
Sections
.text Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 266KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.enigma1 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma2 Size: - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
*����uP Size: - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: - Virtual size: 875KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 46KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ