Static task
static1
Behavioral task
behavioral1
Sample
93f95155fac09674331e80bf084d0519d93d3d0c6784c2837be6da26a2a0132f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
93f95155fac09674331e80bf084d0519d93d3d0c6784c2837be6da26a2a0132f.exe
Resource
win10v2004-20230915-en
General
-
Target
93f95155fac09674331e80bf084d0519d93d3d0c6784c2837be6da26a2a0132f
-
Size
1.1MB
-
MD5
2af1f07dd37dc994ec268d16788d6a61
-
SHA1
b5427b99891ed24d96ab8611bd2e88d3be980834
-
SHA256
93f95155fac09674331e80bf084d0519d93d3d0c6784c2837be6da26a2a0132f
-
SHA512
a247844509e086354a4f9d8bdf3310a00f869955ed0470ce752f8d685686213a42e6c73a9f2074353e987acc5cf0aaae9d482f7f87f099d0930bee98766b090c
-
SSDEEP
24576:yD9b+RDa23/Eoq/plq2AJW7JW15SMMs0mpGNwCU7oD/ng:CEEfxOW7JW150mIwZ7oD/ng
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 93f95155fac09674331e80bf084d0519d93d3d0c6784c2837be6da26a2a0132f
Files
-
93f95155fac09674331e80bf084d0519d93d3d0c6784c2837be6da26a2a0132f.exe windows x86
63420503b1bfa04963f661b5a6cb86a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
psapi
GetProcessImageFileNameW
kernel32
HeapFree
GetCurrentProcess
GetLastError
LoadLibraryW
HeapAlloc
GetProcAddress
LocalFree
GetProcessHeap
GetModuleHandleW
FreeLibrary
GetUserDefaultLangID
QueryDosDeviceW
GetEnvironmentVariableW
GetLogicalDriveStringsW
VirtualQuery
DeviceIoControl
LocalAlloc
GetSystemDirectoryW
FileTimeToSystemTime
FileTimeToLocalFileTime
SetThreadExecutionState
GetCurrentProcessId
GetDriveTypeW
OpenThread
TerminateThread
OutputDebugStringW
Sleep
MoveFileExW
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
WriteConsoleW
SetStdHandle
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
GetLocalTime
GetCurrentThreadId
CreateFileW
SetFilePointer
GetModuleFileNameW
WriteFile
CloseHandle
OpenProcess
WaitForSingleObject
GetTickCount
WaitForMultipleObjects
HeapSize
DecodePointer
GetProcessTimes
TryEnterCriticalSection
GetTimeZoneInformation
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetVersionExW
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
OpenEventW
CreateEventW
SetEvent
ResetEvent
GetComputerNameExW
GlobalAlloc
GlobalFree
SearchPathW
ExpandEnvironmentStringsW
CreateProcessW
GetExitCodeProcess
FindFirstFileW
GetLongPathNameW
GetShortPathNameW
GetFileAttributesExW
CreateMutexW
ReleaseMutex
OpenMutexW
WideCharToMultiByte
SwitchToThread
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetACP
MultiByteToWideChar
GetVolumeInformationW
GetDiskFreeSpaceW
ResumeThread
GetFileAttributesW
LoadLibraryA
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
ReadFile
SetFileTime
SetEndOfFile
GetFileSize
GetFileTime
FindNextFileW
FindClose
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
FileTimeToDosDateTime
LoadLibraryExW
CreateDirectoryW
GetFullPathNameW
lstrlenW
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
SetCurrentDirectoryW
CopyFileW
GetTempFileNameW
MoveFileW
InterlockedExchangeAdd
lstrcatW
lstrcpyW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
FormatMessageW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetStdHandle
GetFileType
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
SetConsoleCtrlHandler
GetCurrentThread
GetStringTypeW
HeapReAlloc
GetDateFormatW
GetTimeFormatW
user32
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
GetParent
GetWindowThreadProcessId
GetWindow
FindWindowExW
IsWindowVisible
GetSystemMetrics
OpenDesktopW
CloseDesktop
ExitWindowsEx
FindWindowW
GetClassNameW
SwitchDesktop
GetDesktopWindow
WindowFromPoint
advapi32
SystemFunction036
ReportEventW
RegisterEventSourceW
DeregisterEventSource
EqualSid
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetEntriesInAclW
LookupPrivilegeNameW
SetNamedSecurityInfoW
OpenProcessToken
FreeSid
GetTokenInformation
RegisterServiceCtrlHandlerExW
SetServiceStatus
StartServiceCtrlDispatcherW
ole32
CoInitializeSecurity
CoInitializeEx
rpcrt4
RpcServerRegisterIfEx
NdrServerCall2
NdrAsyncServerCall
RpcServerUseProtseqEpW
RpcServerListen
imagehlp
ImageRemoveCertificate
ImageEnumerateCertificates
Sections
.text Size: 813KB - Virtual size: 812KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msvcjmc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ