Static task
static1
Behavioral task
behavioral1
Sample
835a3d7738d1dad786d6a01895dd131a9cb552a5093909f15664b4e37c9e4cef.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
835a3d7738d1dad786d6a01895dd131a9cb552a5093909f15664b4e37c9e4cef.exe
Resource
win10v2004-20230915-en
General
-
Target
835a3d7738d1dad786d6a01895dd131a9cb552a5093909f15664b4e37c9e4cef
-
Size
1.2MB
-
MD5
e8fcea50f3cb5d0b2cf5fe7eb5276a96
-
SHA1
cdf4b1cc160f6ef5b69a52d316f205a6042ba0af
-
SHA256
835a3d7738d1dad786d6a01895dd131a9cb552a5093909f15664b4e37c9e4cef
-
SHA512
565218585767bf33e325e8128cae608b9bf44715f62ba7f5405fa3c2f42c0bb68e1e28708f5da32a968ba0480e418745322122ca120896eb8a52a4f7e95aefda
-
SSDEEP
24576:woKNYKmgUSMCOJZ/05AgBcgYL9mNyweW2fsAt4hwu/UEl9bu0PDkGCH:qNq57gBcENQfZt4h5p9bW9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 835a3d7738d1dad786d6a01895dd131a9cb552a5093909f15664b4e37c9e4cef
Files
-
835a3d7738d1dad786d6a01895dd131a9cb552a5093909f15664b4e37c9e4cef.exe windows:5 windows x86
cd88f298feb287e83e03a7aaee1d092c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryW
LoadLibraryW
OutputDebugStringW
SetDllDirectoryW
GetModuleFileNameW
GetCommandLineW
OutputDebugStringA
CreateProcessW
CreateToolhelp32Snapshot
GetLastError
lstrlenW
lstrlenA
CreateFileW
WriteConsoleW
CompareStringW
GetConsoleMode
GetConsoleCP
GetExitCodeProcess
GetTimeZoneInformation
GetCurrentDirectoryW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
FatalAppExitA
HeapReAlloc
GetCurrentProcessId
Process32FirstW
Process32NextW
Sleep
GetTickCount
OpenProcess
WaitForSingleObject
CloseHandle
InterlockedExchange
IsValidCodePage
GetOEMCP
GetACP
QueryPerformanceCounter
HeapDestroy
HeapCreate
GetStartupInfoW
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
HeapSize
GetLocaleInfoW
GetStdHandle
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetLastError
TlsFree
TlsSetValue
TlsGetValue
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesW
InterlockedDecrement
GetDiskFreeSpaceExA
GetDriveTypeW
FindFirstFileW
LocalFree
LocalAlloc
lstrcpyW
GetDriveTypeA
GetLogicalDriveStringsA
DeleteFileA
SetFileAttributesA
GetFileAttributesA
GetModuleFileNameA
GetModuleHandleA
CreateFileA
GetLongPathNameW
HeapAlloc
GetProcessHeap
VirtualQuery
WriteProcessMemory
GetCurrentProcess
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
HeapFree
Thread32Next
Thread32First
SuspendThread
OpenThread
GetCurrentThreadId
TerminateProcess
WaitForMultipleObjects
SearchPathW
DuplicateHandle
CreateEventA
EnterCriticalSection
ReadProcessMemory
VirtualAllocEx
InitializeCriticalSection
SetErrorMode
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetPrivateProfileStringA
LoadLibraryA
GetPrivateProfileStringW
FreeLibrary
InterlockedIncrement
InterlockedCompareExchange
DeleteCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
FormatMessageA
GetEnvironmentVariableA
CreateFileMappingA
OpenFileMappingA
CreateThread
ExitThread
GetCurrentThread
GetExitCodeThread
SleepEx
GetSystemTimeAsFileTime
VirtualProtect
VirtualLock
VirtualUnlock
SetProcessWorkingSetSize
FlushViewOfFile
SetEndOfFile
SetFilePointer
Process32Next
Process32First
GetSystemInfo
GetVersionExA
GetLocalTime
Module32First
LockFile
LockFileEx
UnlockFile
UnlockFileEx
WriteFile
ReadFile
FlushFileBuffers
GetFileSize
CreateDirectoryA
CopyFileA
GetShortPathNameA
CreateMutexA
ReleaseMutex
ResetEvent
SetEvent
ExitProcess
GenerateConsoleCtrlEvent
RtlUnwind
RaiseException
GetCommandLineA
HeapSetInformation
LCMapStringW
GetCPInfo
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExA
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
CreatePipe
CreateProcessA
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetFullPathNameA
SetConsoleCtrlHandler
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFileInformationByHandle
PeekNamedPipe
GetTimeFormatA
GetDateFormatA
MoveFileA
TlsAlloc
OpenMutexA
user32
InflateRect
OffsetRect
SetWindowLongA
MessageBoxA
TranslateMessage
PeekMessageW
GetWindow
GetForegroundWindow
SetWindowPos
DispatchMessageA
SetCursor
ClipCursor
shell32
CommandLineToArgvW
SHCreateDirectoryExW
SHGetDesktopFolder
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteW
version
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoSizeW
shlwapi
PathFileExistsW
PathIsRelativeW
winmm
timeBeginPeriod
timeGetDevCaps
timeSetEvent
timeKillEvent
tx_log
?GetLogLevel@TxLogWrapper@@YG?AW4LogLevel@1@XZ
?MakeLogOutput@TxLogWrapper@@YGXPB_W0W4LogLevel@1@@Z
?SetLogPath@TxLogWrapper@@YGXPB_W@Z
?SetLogLevel@TxLogWrapper@@YGXW4LogLevel@1@@Z
?FlushLog@TxLogWrapper@@YGXXZ
crypt32
CryptMsgClose
CertCloseStore
CertFreeCertificateContext
CertGetNameStringA
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CertGetNameStringW
ws2_32
listen
socket
setsockopt
ioctlsocket
gethostbyname
htons
ntohl
inet_addr
bind
WSAGetLastError
connect
__WSAFDIsSet
select
accept
closesocket
send
recv
htonl
WSACleanup
getsockopt
inet_ntoa
WSAStartup
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoTaskMemFree
CoInitializeSecurity
oleaut32
SysFreeString
VariantClear
CreateErrorInfo
SetErrorInfo
VariantInit
VariantChangeType
GetErrorInfo
SysAllocString
comdlg32
GetOpenFileNameW
advapi32
RegCreateKeyExW
AllocateAndInitializeSid
InitializeSecurityDescriptor
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
GetLengthSid
Sections
.text Size: 804KB - Virtual size: 804KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 45KB - Virtual size: 5.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 247KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE