Static task
static1
Behavioral task
behavioral1
Sample
474354b8b9fff3f7f9149c4b2f2dfc93153e8539e2cd3d584c25af2428a13065.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
474354b8b9fff3f7f9149c4b2f2dfc93153e8539e2cd3d584c25af2428a13065.exe
Resource
win10v2004-20230915-en
General
-
Target
474354b8b9fff3f7f9149c4b2f2dfc93153e8539e2cd3d584c25af2428a13065
-
Size
437KB
-
MD5
723e98d8e207b3f0396eb318a607b4b7
-
SHA1
2eadcfa5c023f72129079189b85bcbadaefb774d
-
SHA256
474354b8b9fff3f7f9149c4b2f2dfc93153e8539e2cd3d584c25af2428a13065
-
SHA512
f4de2ffd863b9585ff2853d222f3808412e4be4f49736432057a7830af9e6531df5cc9b1dbd30e7350d56a8c8a2288a098ebf253f6e3079a3a6314a2a2d48219
-
SSDEEP
12288:7xGphRJSFcCVoz5J3dgSXcQIwocK8+6N6j50ZU6EK/W+45Ondk1vlzwimgpAqhqQ:0/pXD45O8vhBpAIqxRQC2iz4xrEH7M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 474354b8b9fff3f7f9149c4b2f2dfc93153e8539e2cd3d584c25af2428a13065
Files
-
474354b8b9fff3f7f9149c4b2f2dfc93153e8539e2cd3d584c25af2428a13065.exe windows:6 windows x86
d7214d339deab0b16a7e28bdb9d3db42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDrives
CreateMutexA
WaitForSingleObject
ReleaseMutex
DeleteFileA
CloseHandle
ReadFile
GetFileInformationByHandleEx
WriteFile
DeviceIoControl
GetUserDefaultUILanguage
GetVolumeInformationA
CreateFileW
GetFileAttributesW
MultiByteToWideChar
CopyFileA
GetLastError
GetFileAttributesA
CreateFileA
SetEvent
CreateThread
SetFilePointerEx
GetFileSize
WideCharToMultiByte
CreateEventA
FlushFileBuffers
CreateDirectoryW
FindFirstFileW
SetHandleInformation
TlsSetValue
SetLastError
EnterCriticalSection
FindNextFileW
GetLongPathNameW
GetCurrentProcess
TerminateProcess
SetThreadPriority
LeaveCriticalSection
InitializeCriticalSection
GetFullPathNameA
FindClose
GetCurrentThreadId
DuplicateHandle
GetVersion
Sleep
GetFileAttributesExW
GetCurrentThread
TlsAlloc
QueryPerformanceFrequency
DeleteFileW
RaiseException
LoadLibraryW
GetProcAddress
DeleteCriticalSection
FreeLibrary
TlsGetValue
CreateProcessA
GetSystemTimeAsFileTime
TlsFree
QueryPerformanceCounter
MoveFileA
LoadLibraryExA
GetCurrentDirectoryA
SetCurrentDirectoryA
SetDllDirectoryA
GetCurrentDirectoryW
CreateDirectoryA
WriteConsoleW
SetEndOfFile
HeapSize
GetProcessHeap
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
DecodePointer
GetExitCodeProcess
HeapReAlloc
GetConsoleOutputCP
RemoveDirectoryW
GetFileSizeEx
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
SetStdHandle
GetFileType
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetConsoleMode
ReadConsoleW
CreateProcessW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreatePipe
GetStdHandle
GetModuleFileNameW
ExitProcess
HeapFree
HeapAlloc
GetTimeZoneInformation
user32
GetDlgItem
LoadIconA
SendMessageA
DialogBoxParamA
SetWindowTextW
EndDialog
MessageBoxW
EnableWindow
ws2_32
WSAStartup
getsockname
send
ntohs
shutdown
socket
htons
ioctlsocket
getnameinfo
setsockopt
listen
ntohl
select
closesocket
bind
accept
__WSAFDIsSet
WSACleanup
recv
htonl
Sections
.text Size: 266KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ