Static task
static1
Behavioral task
behavioral1
Sample
61a617afda0259ffa854829393730022ba899926d21200cd0816c597083d0038.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
61a617afda0259ffa854829393730022ba899926d21200cd0816c597083d0038.exe
Resource
win10v2004-20230831-en
General
-
Target
61a617afda0259ffa854829393730022ba899926d21200cd0816c597083d0038
-
Size
268KB
-
MD5
c1251aa648391dd866673b09d5c7285d
-
SHA1
cf01b6934c489872d1b24c3a68e9cc279015d141
-
SHA256
61a617afda0259ffa854829393730022ba899926d21200cd0816c597083d0038
-
SHA512
9768a20a87291a24d10d6f4e70b8e0185bfa2a3cdc9e1e4ec46d6cdc72d5f530cba54be184d92a8ba85aac42da1d0dc27018917c3dba636ef5b5f1df1170c8ec
-
SSDEEP
3072:InoHl7GpPoAbRO9pvn2NELiVvdkjbXMXCo7XxvNtXoYbw4I1f9to9WB5L81EtbbQ:/gGAbROTn2NpnvXoYbdwfuSU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61a617afda0259ffa854829393730022ba899926d21200cd0816c597083d0038
Files
-
61a617afda0259ffa854829393730022ba899926d21200cd0816c597083d0038.exe windows x86
62ac3eb2da6c39e3307de53fd5326355
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetCancelConnection2A
WNetAddConnection2A
kernel32
SetConsoleCursorPosition
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
ReadFile
WaitForSingleObject
CreateProcessA
GetFileSize
SetLastError
DeleteFileA
GetComputerNameA
ExitThread
SetEndOfFile
GetLocaleInfoW
HeapSize
SetStdHandle
SetFilePointer
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
IsValidCodePage
GetCurrentProcessId
SetConsoleTitleA
WaitNamedPipeA
Sleep
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SizeofResource
GetCurrentDirectoryA
CreateFileA
WriteFile
CopyFileA
GetStdHandle
ReadConsoleA
GetConsoleMode
SetConsoleMode
HeapAlloc
GetProcessHeap
HeapFree
GetCurrentProcess
CloseHandle
GetLastError
FormatMessageA
LocalFree
CompareStringA
SetEnvironmentVariableA
CompareStringW
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
ExitProcess
ResumeThread
CreateThread
MoveFileA
GetCommandLineA
GetVersionExA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
GetCurrentThread
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
FlushFileBuffers
DeleteCriticalSection
FatalAppExitA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSection
RtlUnwind
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
user32
OpenDesktopA
OpenWindowStationA
CloseDesktop
GetUserObjectSecurity
SetUserObjectSecurity
GetProcessWindowStation
CloseWindowStation
SetProcessWindowStation
advapi32
RegOpenKeyExA
RevertToSelf
RegQueryValueExA
RegCloseKey
ImpersonateLoggedOnUser
CreateProcessAsUserA
AddAccessAllowedAce
GetSecurityDescriptorDacl
GetAclInformation
InitializeAcl
GetAce
AddAce
LogonUserA
CreateProcessWithLogonW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenSCManagerA
OpenServiceA
CreateServiceA
CloseServiceHandle
StartServiceA
GetLengthSid
CopySid
OpenProcessToken
GetTokenInformation
EqualSid
FreeSid
AllocateAndInitializeSid
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ