Static task
static1
Behavioral task
behavioral1
Sample
7e4b09918ca9756cd93bf0d974083e40a088d8f5d11393ee533bf7cb2787471d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7e4b09918ca9756cd93bf0d974083e40a088d8f5d11393ee533bf7cb2787471d.exe
Resource
win10v2004-20230915-en
General
-
Target
7e4b09918ca9756cd93bf0d974083e40a088d8f5d11393ee533bf7cb2787471d
-
Size
262KB
-
MD5
b3affcb3ed47717a791a549953c9525e
-
SHA1
c15008375f592d29708dcb62afdea61e10cdf947
-
SHA256
7e4b09918ca9756cd93bf0d974083e40a088d8f5d11393ee533bf7cb2787471d
-
SHA512
e55d30ed1d8b1b394b0d4ae75c0e990233977d11ed6174d9a215ca6ae13689b10d904ff6b218577937fc72c4ead448ce009c3a00bcd374c23a3fe684bb7de759
-
SSDEEP
3072:SY6I93/sQRlkp5g5zRJPxB+ftGMpHjZDcTDdP2zyJTmbJC:SY1lblGg5FJPsGMXeFVJqY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e4b09918ca9756cd93bf0d974083e40a088d8f5d11393ee533bf7cb2787471d
Files
-
7e4b09918ca9756cd93bf0d974083e40a088d8f5d11393ee533bf7cb2787471d.exe windows:5 windows x86
78813ac1c259270ab5e5660d7fe75110
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
nwprovau
NwEnumConnections
NwSetLogonScript
NwQueryInfo
NPOpenEnum
advapi32
RegOpenKeyExW
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegSetValueExA
RegCreateKeyExW
kernel32
IsValidCodePage
GetLastError
LocalFree
LocalAlloc
GetEnvironmentVariableA
MultiByteToWideChar
WideCharToMultiByte
WriteConsoleW
GetStdHandle
CloseHandle
IsDBCSLeadByte
SetConsoleCursorPosition
ScrollConsoleScreenBufferA
GetConsoleScreenBufferInfo
CreateFileW
GetTimeFormatW
GetDateFormatW
ReadFile
GetSystemDefaultLCID
FileTimeToSystemTime
DosDateTimeToFileTime
GetTimeZoneInformation
SetConsoleCtrlHandler
GetDriveTypeA
SetFilePointer
CreateFileA
GetModuleHandleA
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
HeapFree
GetCurrentDirectoryA
SetCurrentDirectoryA
HeapAlloc
GetSystemTimeAsFileTime
Beep
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
SetEnvironmentVariableA
GetFullPathNameA
WriteFile
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
GetCPInfo
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetProcessHeap
GetStringTypeA
GetStringTypeW
VirtualAlloc
HeapReAlloc
VirtualProtect
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
SetEnvironmentVariableW
GetFileAttributesA
LoadLibraryA
GetACP
GetOEMCP
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
RtlUnwind
GetLocaleInfoW
SetEndOfFile
user32
LoadStringA
CharPrevA
wsprintfW
LoadStringW
mpr
WNetOpenEnumW
WNetEnumResourceA
WNetGetConnection2A
WNetGetConnectionA
WNetCloseEnum
WNetAddConnection2A
WNetCancelConnection2A
WNetGetLastErrorW
ntdll
NtClose
RtlInitUnicodeString
_strcmpi
RtlUnicodeStringToOemString
RtlOemStringToUnicodeString
NtFsControlFile
NtOpenFile
nwapi32
NWDetachFromFileServer
NWGetFileServerVersionInfo
NwNdsReadObjectInfo
NwNdsOpenGenericHandle
NWGetObjectName
NwlibMakeNcp
NWAttachToFileServer
NWReadPropertyValue
NwNdsOpenStream
NwNdsReadAttribute
NwNdsOpenTreeHandle
NwNdsSetTreeContext
NwNdsGetTreeContext
NwNdsResolveName
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE