Static task
static1
Behavioral task
behavioral1
Sample
25690d7bdac0b0db219e2ca88bdc0c11383613fcf701fa49d45a41c88ff6bbc8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
25690d7bdac0b0db219e2ca88bdc0c11383613fcf701fa49d45a41c88ff6bbc8.exe
Resource
win10v2004-20230915-en
General
-
Target
25690d7bdac0b0db219e2ca88bdc0c11383613fcf701fa49d45a41c88ff6bbc8
-
Size
6.9MB
-
MD5
1022ea535cd2eabc3fd2c26e2eb0d0f6
-
SHA1
0fbb9adb5ead5b9ff2e6e68d4d3ee86097c55321
-
SHA256
25690d7bdac0b0db219e2ca88bdc0c11383613fcf701fa49d45a41c88ff6bbc8
-
SHA512
d13e217a86b9520a0e6c1554187bfa674e9e61f15512dec3b5b8d33188109b42fd3456c9e9920fa56c9c2fcec3951f978d7620d967045d6c033499c5f3339096
-
SSDEEP
98304:4rK76eR0Gr+WodiMCVVfrZNMHrWTxRJw+WodiMCVVfrZNMHrWTxRJw+WodiMCVVa:4l+p9zr3a9zr3a9zr3a9zr3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25690d7bdac0b0db219e2ca88bdc0c11383613fcf701fa49d45a41c88ff6bbc8
Files
-
25690d7bdac0b0db219e2ca88bdc0c11383613fcf701fa49d45a41c88ff6bbc8.exe windows x86
076ff57d81c7319523bb502b9f096805
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessW
UnmapViewOfFile
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
ProcessIdToSessionId
Process32NextW
GetModuleHandleW
GetCurrentProcess
GetLongPathNameW
CreateThread
GetProcAddress
LoadLibraryW
WaitForSingleObject
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetConsoleMode
GetConsoleCP
InterlockedExchange
SetConsoleCtrlHandler
GetLocaleInfoW
FatalAppExitA
SetEvent
FlushViewOfFile
MapViewOfFile
ResetEvent
CreateFileMappingW
CreateEventW
SetFilePointer
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleFileNameW
WriteFile
GetLastError
CloseHandle
ReadFile
GetFileSize
CreateFileW
GetTimeZoneInformation
GetStringTypeW
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
LCMapStringW
GetCurrentThread
SetLastError
TlsFree
TlsAlloc
CreateMutexW
GetLocalTime
MoveFileW
ReleaseMutex
OutputDebugStringW
CopyFileW
DeleteFileW
GetCurrentProcessId
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetUserDefaultLangID
OpenMutexW
MultiByteToWideChar
LoadLibraryExW
InterlockedDecrement
FlushFileBuffers
MoveFileExW
LoadLibraryA
IsBadStringPtrW
IsBadReadPtr
WideCharToMultiByte
OutputDebugStringA
FindFirstFileW
VirtualQuery
SetFilePointerEx
GetLogicalDriveStringsW
CreateDirectoryW
Sleep
GetFileAttributesW
FindClose
RemoveDirectoryW
QueryDosDeviceW
FindNextFileW
SetFileAttributesW
FreeLibrary
Thread32First
GetVersionExW
Thread32Next
GetSystemInfo
FileTimeToSystemTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetFileSizeEx
CreateFileA
DeviceIoControl
GetModuleFileNameA
GetDiskFreeSpaceExW
lstrlenA
LocalFree
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
lstrcpyA
lstrcatA
SetEndOfFile
MoveFileWithProgressW
ReplaceFileW
DuplicateHandle
GetFileInformationByHandle
OpenFileMappingW
ResumeThread
GetFileType
VirtualProtect
IsBadWritePtr
GetFileTime
SetFileTime
CopyFileExW
RtlMoveMemory
SetThreadContext
GetThreadContext
GetCurrentThreadId
SuspendThread
OpenThread
SwitchToThread
HeapCreate
TlsGetValue
TlsSetValue
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
Module32FirstW
Module32NextW
CreateRemoteThread
VirtualFree
VirtualAlloc
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetTimeFormatW
GetDateFormatW
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
ExitProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
user32
RegisterClassExW
CreateWindowExW
LoadIconW
GetClipboardData
SetClipboardData
ShowWindow
IsWindowVisible
InternalGetWindowText
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
UpdateWindow
DialogBoxParamW
DestroyWindow
DefWindowProcW
BeginPaint
EndPaint
PostQuitMessage
EndDialog
MessageBoxW
GetClassNameW
GetForegroundWindow
GetWindowTextW
LoadCursorW
GetDlgItem
advapi32
AdjustTokenPrivileges
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
StartServiceW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegEnumValueW
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegEnumKeyW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
RegCloseKey
RegFlushKey
RegCreateKeyExW
OpenProcessToken
LookupPrivilegeValueW
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
CommandLineToArgvW
SHGetSpecialFolderPathW
psapi
GetModuleFileNameExW
EnumProcessModules
GetMappedFileNameW
GetModuleInformation
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
shlwapi
StrStrIW
PathFileExistsW
PathMatchSpecW
StrChrW
dbghelp
ImageDirectoryEntryToData
ole32
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
oleaut32
GetErrorInfo
SysStringByteLen
VariantChangeType
SysAllocString
SysFreeString
VariantClear
VariantInit
SetErrorInfo
CreateErrorInfo
SysAllocStringByteLen
Sections
.text Size: 744KB - Virtual size: 743KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
pgdate Size: 1.5MB - Virtual size: 1.5MB
pgdate Size: 1.5MB - Virtual size: 1.5MB
pgdate Size: 1.5MB - Virtual size: 1.5MB
pgdate Size: 1.5MB - Virtual size: 1.5MB