Static task
static1
Behavioral task
behavioral1
Sample
9eb24453f78c6de1dcc9f10926ddb38415b0a114ae36fbda1dc3be45e44164a2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9eb24453f78c6de1dcc9f10926ddb38415b0a114ae36fbda1dc3be45e44164a2.exe
Resource
win10v2004-20230915-en
General
-
Target
9eb24453f78c6de1dcc9f10926ddb38415b0a114ae36fbda1dc3be45e44164a2
-
Size
2.5MB
-
MD5
fda40c5bbe6b2e0e2c5e0a5722c9d9d7
-
SHA1
ee883b9da5e1c9d1d1da4565c904636f9f2a5042
-
SHA256
9eb24453f78c6de1dcc9f10926ddb38415b0a114ae36fbda1dc3be45e44164a2
-
SHA512
2ff0a82f5f779bee78c72eacb3ae2db039dbb7334397e7a2ccbe9f0035ce7a32548e4b131496fadc3d05b02785bd03467dd9d3b061f16b88f7ab6e8d1841c713
-
SSDEEP
49152:2Ogo4SoH0OZ61PCEb5bOmGWsbdbQPWhHLCPjcW4:2OFJtCEdbOmBsbdbrhHWrcW4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9eb24453f78c6de1dcc9f10926ddb38415b0a114ae36fbda1dc3be45e44164a2
Files
-
9eb24453f78c6de1dcc9f10926ddb38415b0a114ae36fbda1dc3be45e44164a2.exe windows x64
eee0dde12ea6ca8b793cc36b5a38808b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
bcrypt
BCryptGenRandom
crypt32
CryptStringToBinaryA
CryptBinaryToStringA
ws2_32
htonl
inet_pton
WSADuplicateSocketW
WSASocketW
WSACleanup
FreeAddrInfoW
bind
WSAIoctl
closesocket
WSASend
WSAStartup
getsockname
socket
gethostname
GetAddrInfoW
WSARecv
WSAGetOverlappedResult
setsockopt
WSAGetLastError
kernel32
GetFileSizeEx
ReadConsoleW
FreeLibraryAndExitThread
ExitThread
CreateThread
FindNextFileW
FindFirstFileExW
FindClose
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetConsoleOutputCP
SetConsoleMode
SetConsoleOutputCP
GetModuleFileNameW
CreateDirectoryW
GetConsoleScreenBufferInfo
GetCurrentProcess
GetStdHandle
WaitForSingleObject
CreateFileW
GetLastError
CloseHandle
LoadLibraryW
GetProcAddress
LocalFree
MoveFileExW
GetComputerNameW
FreeLibrary
WideCharToMultiByte
GetFileType
SetEvent
ResetEvent
VerSetConditionMask
SleepEx
VerifyVersionInfoW
CreateEventA
ExpandEnvironmentStringsW
GetSystemDirectoryW
GetWindowsDirectoryW
SetHandleInformation
TerminateProcess
SetEndOfFile
GetCurrentThreadId
DuplicateHandle
GetTickCount64
SetFilePointerEx
GetCurrentProcessId
CreateProcessW
OpenThread
FlushFileBuffers
FillConsoleOutputCharacterA
SetConsoleTextAttribute
SetConsoleScreenBufferSize
ScrollConsoleScreenBufferA
GetConsoleCursorInfo
SetConsoleWindowInfo
GetConsoleMode
SetConsoleCursorInfo
ReadConsoleInputW
CreateFileA
WriteConsoleOutputA
HeapAlloc
WriteConsoleW
Beep
GetConsoleWindow
SetConsoleCursorPosition
ReadConsoleOutputA
GetExitCodeProcess
CancelIo
CreateNamedPipeA
DeviceIoControl
WriteFileEx
CreateHardLinkW
GetFileInformationByHandle
GetFileAttributesExW
ReadFileEx
GetLogicalDriveStringsW
GetDiskFreeSpaceExW
GetDriveTypeW
SetConsoleCtrlHandler
QueueUserAPC
GetFinalPathNameByHandleW
LoadLibraryExW
WaitForMultipleObjectsEx
WaitForSingleObjectEx
RtlUnwind
WriteFile
CancelSynchronousIo
CancelIoEx
CreateWaitableTimerA
ReleaseMutex
CreateMutexA
VirtualAlloc
VirtualFree
InitOnceExecuteOnce
GetSystemTime
SystemTimeToFileTime
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
PeekNamedPipe
GetCommandLineW
GetCommandLineA
GetCurrentDirectoryW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetTimeZoneInformation
GetStringTypeW
GetNumberOfConsoleInputEvents
PeekConsoleInputA
HeapReAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
HeapSize
FillConsoleOutputAttribute
HeapFree
MultiByteToWideChar
ReadFile
SetEnvironmentVariableW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
RaiseException
RtlPcToFileHeader
ExitProcess
GetModuleHandleExW
SetStdHandle
RemoveDirectoryW
SetFileAttributesW
GetFullPathNameW
DeleteFileW
user32
GetWindowPlacement
ShowWindow
advapi32
ConvertSidToStringSidA
EqualSid
CreateProcessAsUserW
RegCloseKey
RegOpenKeyExW
ConvertSidToStringSidW
LookupAccountSidW
RegQueryValueExW
GetSidIdentifierAuthority
GetAce
CreateWellKnownSid
CopySid
GetNamedSecurityInfoW
IsWellKnownSid
IsValidSid
IsValidSecurityDescriptor
OpenProcessToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetLengthSid
IsValidAcl
LookupAccountNameW
GetTokenInformation
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 209KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ