Static task
static1
Behavioral task
behavioral1
Sample
dbdb3e51f7155af8eca21f87292981390d77b39a30540b510aae23c6811009b5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dbdb3e51f7155af8eca21f87292981390d77b39a30540b510aae23c6811009b5.exe
Resource
win10v2004-20230915-en
General
-
Target
dbdb3e51f7155af8eca21f87292981390d77b39a30540b510aae23c6811009b5
-
Size
10.5MB
-
MD5
bbb795b46b598bddb2a65717bf45940c
-
SHA1
55357e7f68032d03b79798cb89c56a21b1ac65e0
-
SHA256
dbdb3e51f7155af8eca21f87292981390d77b39a30540b510aae23c6811009b5
-
SHA512
fd1303ade43e697880c5e4e841fe1e7d71d6674c756b83cfe81cfa06ced1293b96c23233b5aa10b48073174a2b0b08ed7cf2bab8ff403c0591b38ffb69cdf123
-
SSDEEP
49152:L3kkPAW+JmREk3p5LP0b9xM2k3p5LP0b9xM2k3p5LP0b9xM2k3p5LP0b9xM2k3ph:LaARhiGiGiGiGiGiGiGiGiGiGiGi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dbdb3e51f7155af8eca21f87292981390d77b39a30540b510aae23c6811009b5
Files
-
dbdb3e51f7155af8eca21f87292981390d77b39a30540b510aae23c6811009b5.exe windows:5 windows x64
9bb3e60d3e43c4ff14dfb20402a8aad9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateThread
UnmapViewOfFile
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
ProcessIdToSessionId
Process32NextW
GetModuleHandleW
GetCurrentProcess
Sleep
GetProcAddress
LoadLibraryW
WaitForSingleObject
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
MapViewOfFile
CreateFileMappingW
SetFilePointer
GlobalFree
GlobalAlloc
GetModuleFileNameW
WriteFile
GetLastError
CloseHandle
ReadFile
GetFileSize
CreateFileW
GetStringTypeW
GetTickCount
QueryPerformanceCounter
GetVersion
HeapSetInformation
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
LCMapStringW
FlsAlloc
SetLastError
CreateMutexW
GetLocalTime
MoveFileW
ReleaseMutex
OutputDebugStringW
OpenMutexW
MultiByteToWideChar
GetUserDefaultLangID
FlushFileBuffers
MoveFileExW
LoadLibraryExW
GetCurrentProcessId
LoadLibraryA
IsBadStringPtrW
IsBadReadPtr
WideCharToMultiByte
VirtualQuery
CreateDirectoryW
GetFileAttributesW
GetVersionExW
GetSystemInfo
CreateFileA
DeviceIoControl
lstrlenA
LocalFree
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
lstrcpyA
lstrcatA
GetFileType
VirtualProtect
GetCurrentThreadId
HeapCreate
EncodePointer
DecodePointer
GetCommandLineW
GetStartupInfoW
GetSystemTimeAsFileTime
GetDateFormatW
GetTimeFormatW
GetDateFormatA
GetTimeFormatA
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsSetValue
FlsFree
user32
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
MessageBoxW
advapi32
AdjustTokenPrivileges
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
StartServiceW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
OpenProcessToken
LookupPrivilegeValueW
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
SHGetSpecialFolderPathW
psapi
GetModuleFileNameExW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ole32
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
oleaut32
SysStringByteLen
SysAllocString
SysFreeString
VariantClear
VariantInit
SysAllocStringByteLen
Sections
.text Size: 339KB - Virtual size: 339KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
pgdate Size: 850KB - Virtual size: 852KB
pgdate Size: 850KB - Virtual size: 852KB
pgdate Size: 850KB - Virtual size: 852KB
pgdate Size: 850KB - Virtual size: 852KB
pgdate Size: 850KB - Virtual size: 852KB
pgdate Size: 850KB - Virtual size: 852KB
pgdate Size: 850KB - Virtual size: 852KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_WRITE
pgdate Size: 850KB - Virtual size: 852KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
pgdate Size: 850KB - Virtual size: 852KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
pgdate Size: 850KB - Virtual size: 852KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
pgdate Size: 850KB - Virtual size: 852KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
pgdate Size: 850KB - Virtual size: 852KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ