GetHandleVerifier
Static task
static1
Behavioral task
behavioral1
Sample
6b2a57d90c7ac293c8951de8e0eb60199ddf8ed1ba1d8e9a8ef9f140cb80d768.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6b2a57d90c7ac293c8951de8e0eb60199ddf8ed1ba1d8e9a8ef9f140cb80d768.exe
Resource
win10v2004-20230915-en
General
-
Target
6b2a57d90c7ac293c8951de8e0eb60199ddf8ed1ba1d8e9a8ef9f140cb80d768
-
Size
2.1MB
-
MD5
f313c143f401a4584e6195f0ecdb0b71
-
SHA1
176478d364dbd9085429746c7f2a98ee81d29821
-
SHA256
6b2a57d90c7ac293c8951de8e0eb60199ddf8ed1ba1d8e9a8ef9f140cb80d768
-
SHA512
061df77434782941267fb5e323a7d2a4dac0223859a96cf944f204162ee106eeb7b8a8d8f1dbf2fb43b1ce386152cebd5bf73998e3e10aa0ffd71c442f98ace6
-
SSDEEP
49152:LUgvZl/oWfOyt3rlPku6ZRhouDFMyDgkAPZN3MlxRJ8yWFi0:4gvPnqhouDF9XAPolR8yWF/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6b2a57d90c7ac293c8951de8e0eb60199ddf8ed1ba1d8e9a8ef9f140cb80d768
Files
-
6b2a57d90c7ac293c8951de8e0eb60199ddf8ed1ba1d8e9a8ef9f140cb80d768.exe windows x86
07eb12df2dff9a168484413aafb4f746
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
powrprof
PowerDeterminePlatformRole
setupapi
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
CM_Get_Device_IDW
kernel32
GetTickCount
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FileTimeToSystemTime
ProcessIdToSessionId
GetCommandLineW
GetDiskFreeSpaceExW
GetVolumeInformationW
QueryDosDeviceW
GetTempPathW
GetCurrentProcessId
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetVersion
GetSystemDirectoryW
LocalAlloc
lstrcmpW
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
CopyFileW
MoveFileExW
WTSGetActiveConsoleSessionId
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
CreateEventW
CreateThread
MoveFileW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
LoadLibraryExW
lstrcmpiW
GetEnvironmentVariableW
lstrlenW
GetProcessId
GetModuleHandleA
GetTempFileNameW
GetLogicalDriveStringsW
GetVolumePathNameW
ReplaceFileW
SetCurrentDirectoryW
GetFileAttributesExW
GetNativeSystemInfo
CreateMutexW
FormatMessageA
OutputDebugStringA
ReleaseMutex
RegisterWaitForSingleObject
UnregisterWaitEx
FindFirstFileExW
SystemTimeToTzSpecificLocalTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
SetEndOfFile
SetFilePointerEx
UnlockFile
LockFile
GetLocalTime
GetFileSizeEx
DuplicateHandle
Sleep
SetThreadPriority
GetThreadPriority
IsDebuggerPresent
GetUserDefaultLangID
TryEnterCriticalSection
GetModuleHandleExW
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetInformationJobObject
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
WaitForMultipleObjects
GlobalMemoryStatusEx
RtlCaptureStackBackTrace
QueueUserWorkItem
GetModuleHandleExA
GetProcessHeaps
HeapSetInformation
HeapUnlock
HeapLock
HeapWalk
GetProcessIoCounters
VirtualQueryEx
GetProcessTimes
GetSystemInfo
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
WriteConsoleW
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
FatalAppExitA
ReadConsoleW
CreateSemaphoreW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStdHandle
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
GetFileInformationByHandle
IsValidCodePage
AreFileApisANSI
ExitProcess
GetConsoleMode
GetConsoleCP
GetFileType
SetStdHandle
SetConsoleCtrlHandler
IsProcessorFeaturePresent
VirtualQuery
VirtualProtect
DeleteCriticalSection
InitializeCriticalSectionEx
SystemTimeToFileTime
SetFileTime
SetFilePointer
LocalFileTimeToFileTime
GetCurrentDirectoryW
GetCurrentThread
GetCurrentProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LoadLibraryW
FreeLibrary
GetWindowsDirectoryW
OpenProcess
WaitForSingleObject
LocalFree
GetProcAddress
GetModuleHandleW
GetVersionExW
DeviceIoControl
SetLastError
SetFileAttributesW
GetLongPathNameW
GetFullPathNameW
ExpandEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
WriteFile
ReadFile
GetFileSize
CreateFileW
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
RemoveDirectoryW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
CreateDirectoryW
EnumSystemLocalesW
GetDriveTypeW
GetFullPathNameA
SetEnvironmentVariableA
DecodePointer
FlushFileBuffers
LoadLibraryExA
VirtualAlloc
RtlUnwind
EncodePointer
OutputDebugStringW
user32
GetClassNameW
CreateWindowExW
EnumWindows
GetWindowLongW
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
DefWindowProcW
DestroyWindow
CharNextW
UnregisterClassW
GetDesktopWindow
GetDC
ExitWindowsEx
SetTimer
PostQuitMessage
KillTimer
WaitMessage
GetQueueStatus
TranslateMessage
RegisterClassExW
CallMsgFilterW
PeekMessageW
MsgWaitForMultipleObjectsEx
DispatchMessageW
CharUpperW
GetKeyState
IsWindowEnabled
FindWindowW
SystemParametersInfoW
IsWindow
GetSystemMetrics
PostMessageW
gdi32
DeleteObject
GetDeviceCaps
advapi32
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
SystemFunction036
RegNotifyChangeKeyValue
RegEnumValueW
ConvertSidToStringSidW
RegDeleteValueW
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegOpenCurrentUser
RegCloseKey
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
FreeSid
EqualSid
DuplicateToken
AllocateAndInitializeSid
AddAccessAllowedAce
AccessCheck
LookupPrivilegeValueW
RevertToSelf
ImpersonateSelf
AdjustTokenPrivileges
OpenThreadToken
SetThreadToken
ConvertStringSidToSidW
LookupAccountSidW
SetTokenInformation
GetTokenInformation
DuplicateTokenEx
OpenProcessToken
CreateProcessAsUserW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
IsValidSid
InitializeSid
InitializeAcl
GetSidSubAuthority
GetSidLengthRequired
GetLengthSid
GetAclInformation
GetAce
CopySid
AddAce
RegisterTraceGuidsW
shell32
ShellExecuteW
SHFileOperationW
ShellExecuteExW
SHGetFolderPathA
SHGetFolderPathW
SHGetKnownFolderPath
CommandLineToArgvW
SHGetSpecialFolderPathW
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
PropVariantClear
oleaut32
SysAllocString
SysFreeString
VarUI4FromStr
VariantClear
SysStringLen
shlwapi
SHSetValueW
ord176
StrToIntW
SHStrDupW
StrChrW
SHGetValueW
StrCmpNW
StrCmpNIW
StrRChrW
StrCmpIW
StrCpyNW
PathRemoveFileSpecW
PathIsDirectoryW
PathGetDriveNumberW
PathFindExtensionW
PathAddBackslashW
PathFileExistsW
PathAppendW
comctl32
InitCommonControlsEx
userenv
LoadUserProfileW
UnloadUserProfile
CreateEnvironmentBlock
DestroyEnvironmentBlock
mpr
WNetGetResourceInformationW
psapi
GetProcessMemoryInfo
EnumProcessModules
GetModuleFileNameExW
GetProcessImageFileNameW
GetMappedFileNameW
QueryWorkingSet
EnumProcesses
netapi32
NetApiBufferFree
NetGetJoinInformation
winmm
timeGetTime
timeBeginPeriod
timeEndPeriod
Exports
Exports
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 604KB - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE