Static task
static1
Behavioral task
behavioral1
Sample
d150edd2cb4c13e3bbdcf775597c35fa5de2fe26541f7f5ae0a54c1afa25d16d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d150edd2cb4c13e3bbdcf775597c35fa5de2fe26541f7f5ae0a54c1afa25d16d.exe
Resource
win10v2004-20230915-en
General
-
Target
d150edd2cb4c13e3bbdcf775597c35fa5de2fe26541f7f5ae0a54c1afa25d16d
-
Size
1.0MB
-
MD5
6ce236b7d158ccc959e39ddfb3caee6c
-
SHA1
23d71f2c2ddb3e05c82181bbd1124c6b65001fe0
-
SHA256
d150edd2cb4c13e3bbdcf775597c35fa5de2fe26541f7f5ae0a54c1afa25d16d
-
SHA512
96514f2e3b9988210f7c6eddc6a3d43deb597c463da47599cc5b3afdcd93f3b6d57054c8cd7dfe96056ebb4d81a692a66a155a43d5f4ecb48b857d6749100561
-
SSDEEP
12288:0GC4pvinek5umrza50UbR3waX/TV25IEtGUfhSSqmxTN+oU/f:0xIviek5uQzbUFw0LV2KaGUfrbN+J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d150edd2cb4c13e3bbdcf775597c35fa5de2fe26541f7f5ae0a54c1afa25d16d
Files
-
d150edd2cb4c13e3bbdcf775597c35fa5de2fe26541f7f5ae0a54c1afa25d16d.exe windows:6 windows x64
4cc7554125acf28f29f3cda3a7d38d0a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
GetTokenInformation
SystemFunction036
OpenProcessToken
kernel32
CloseHandle
GetCurrentProcess
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
ReleaseSRWLockExclusive
FreeEnvironmentStringsW
ReleaseMutex
FindClose
ReleaseSRWLockShared
CompareStringOrdinal
GetLastError
AddVectoredExceptionHandler
SetThreadStackGuarantee
Sleep
AcquireSRWLockExclusive
GetCurrentThread
RtlCaptureContext
GetProcAddress
RtlLookupFunctionEntry
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCommandLineW
FlushFileBuffers
SetFileInformationByHandle
DuplicateHandle
SetFilePointerEx
GetStdHandle
GetCurrentProcessId
WriteFileEx
SleepEx
ReadFileEx
WaitForSingleObject
GetExitCodeProcess
TerminateProcess
TryAcquireSRWLockExclusive
QueryPerformanceCounter
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
AcquireSRWLockShared
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetModuleHandleA
FindNextFileW
CreateFileW
GetFileInformationByHandle
GetFileInformationByHandleEx
CreateDirectoryW
FindFirstFileW
DeleteFileW
CreateEventW
ReadFile
GetOverlappedResult
CancelIo
GetConsoleMode
GetFileType
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
ExitProcess
GetFullPathNameW
CreateNamedPipeW
WaitForMultipleObjects
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
CreateThread
TlsGetValue
TlsSetValue
GetSystemTimeAsFileTime
GetConsoleOutputCP
HeapSize
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStringTypeW
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
WriteFile
LoadLibraryExW
FreeLibrary
TlsFree
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
RaiseException
RtlPcToFileHeader
GetCurrentThreadId
InitializeSListHead
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
shell32
ShellExecuteW
user32
MessageBoxW
ntdll
NtReadFile
RtlNtStatusToDosError
NtWriteFile
bcrypt
BCryptGenRandom
Sections
.text Size: 706KB - Virtual size: 705KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 331KB - Virtual size: 330KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ