Static task
static1
Behavioral task
behavioral1
Sample
Systemcmd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Systemcmd.exe
Resource
win10v2004-20230915-en
General
-
Target
Systemcmd.exe
-
Size
191KB
-
MD5
a4854911864ecc9eaccb974eb06e1b9f
-
SHA1
9f0b068b5f956d17176a5c70cdf800524a165c6f
-
SHA256
11c2cf30b811750eee9361407d7245c783c02573f3fd20dba9efcff2533e869e
-
SHA512
e2cea1e3ab9fc50b6874f7bee6c113a4fc194118ff407d3e43f6861b188b6b8fb4abbf61f8f8b353daddb726708bcd7ccfa98868a8bc3e709d998835df097fdd
-
SSDEEP
3072:WU55I82nffzOFYYzIQ7jJwCHmXjZ2p2uiHUuxvNSv9NzD6ce/C/Aq+JAVhHr6M:WU55IX31YzL7DCjZ2pVEvNlJ/M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Systemcmd.exe
Files
-
Systemcmd.exe.exe windows:5 windows x64
48e7c911137b7d68a5a93c15d274c628
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
OpenProcess
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
GetProcAddress
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
Process32NextW
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
WideCharToMultiByte
EncodePointer
DecodePointer
MultiByteToWideChar
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
CloseHandle
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcessId
RtlPcToFileHeader
RaiseException
GetLastError
FreeLibrary
LoadLibraryExW
RtlUnwindEx
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameA
GetCommandLineA
GetCommandLineW
GetACP
HeapAlloc
HeapReAlloc
HeapFree
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
GetFileType
FindClose
FindFirstFileExA
FindNextFileA
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
HeapSize
WriteConsoleW
ReadConsoleW
CreateFileW
lstrcmpW
advapi32
SystemFunction036
CreateProcessWithTokenW
DuplicateTokenEx
OpenProcessToken
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 648B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ