Static task
static1
Behavioral task
behavioral1
Sample
916627e0a90d9e5615ae93bc6221857e1cce4c57bd9fa2a1316c286ec0814dc8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
916627e0a90d9e5615ae93bc6221857e1cce4c57bd9fa2a1316c286ec0814dc8.exe
Resource
win10v2004-20230915-en
General
-
Target
916627e0a90d9e5615ae93bc6221857e1cce4c57bd9fa2a1316c286ec0814dc8
-
Size
5.4MB
-
MD5
80983409282414181744ec370ed50903
-
SHA1
5030f24271be93b70eada058573eab1af84978da
-
SHA256
916627e0a90d9e5615ae93bc6221857e1cce4c57bd9fa2a1316c286ec0814dc8
-
SHA512
aefb666be1a03b58e95cdfdc6836b1c02f3c48cd000b4e9770bf8ed3369b969216f33dface8488600a30dcf4368bedb1d8b68125a74ff127646a86592634a0e4
-
SSDEEP
98304:qk9Q6TSYT1PD76UuJLd4d+L++1x1SHLC9:TQIT1PX6jLdY+y+1x1uL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 916627e0a90d9e5615ae93bc6221857e1cce4c57bd9fa2a1316c286ec0814dc8
Files
-
916627e0a90d9e5615ae93bc6221857e1cce4c57bd9fa2a1316c286ec0814dc8.exe windows x64
42c08201feb84f3fb55e658f65fadcef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetModuleHandleExW
SetLastError
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
GetFileType
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
VirtualFree
CreateProcessA
WideCharToMultiByte
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentVariableW
GetACP
GetSystemDirectoryA
FreeLibrary
LoadLibraryA
FormatMessageA
LoadLibraryW
FindClose
FindFirstFileW
FindNextFileW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
SetEndOfFile
WriteConsoleW
HeapSize
GetTimeZoneInformation
GetStringTypeW
SetEnvironmentVariableW
lstrcmpiA
GetProcessHeap
GetComputerNameW
ExitProcess
Beep
HeapAlloc
LoadResource
CloseHandle
Process32Next
LockResource
CreateFileA
GetLastError
GetTickCount64
Sleep
CreateToolhelp32Snapshot
SetCurrentDirectoryA
FreeResource
FindResourceA
CreateMutexW
WriteFile
HeapFree
Process32First
SizeofResource
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
GetCurrentDirectoryW
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
HeapReAlloc
CreateDirectoryW
GetConsoleOutputCP
SetStdHandle
LCMapStringW
CompareStringW
FlsFree
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
SetConsoleCtrlHandler
ReadFile
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameW
FlsAlloc
FlsGetValue
FlsSetValue
user32
GetProcessWindowStation
MessageBoxA
MessageBoxW
GetUserObjectInformationW
advapi32
CryptCreateHash
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
DeregisterEventSource
CryptDecrypt
CryptExportKey
CryptGetUserKey
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertOpenStore
ws2_32
connect
closesocket
send
recv
WSASetLastError
getservbyname
getservbyport
socket
inet_ntoa
getsockopt
htons
htonl
WSAGetLastError
WSACleanup
WSAStartup
gethostbyname
select
ntohs
ioctlsocket
setsockopt
shutdown
gethostbyaddr
inet_addr
bcrypt
BCryptGenRandom
Sections
.text Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 752KB - Virtual size: 751KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ