Static task
static1
Behavioral task
behavioral1
Sample
b09fa0f66671656ae55bdfd4587e49cae4f982a1bd24c4d6b27e8b5e61ed9696.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b09fa0f66671656ae55bdfd4587e49cae4f982a1bd24c4d6b27e8b5e61ed9696.exe
Resource
win10v2004-20230915-en
General
-
Target
b09fa0f66671656ae55bdfd4587e49cae4f982a1bd24c4d6b27e8b5e61ed9696
-
Size
275KB
-
MD5
6fbabc13826659f8ddbd5aee5b800da4
-
SHA1
75d793cafd871b13e805b51f3b78b7b930442158
-
SHA256
b09fa0f66671656ae55bdfd4587e49cae4f982a1bd24c4d6b27e8b5e61ed9696
-
SHA512
9e2d6566f58984cbb35bf0dab2d33a216aa6b55b03281ccb43d636f6db18bc3f2bbdd8245d6b414befa163a1f8e3db7b21f16bec75763c1531197590d64892ea
-
SSDEEP
6144:SCsmPUqMZ4c6DvNmrPmD87XAJ4Wl3O6mNzIHrvo6SCpj+HXi4sbBGasms1Yh7lGT:SCsmPUqMmcMmbm47ZiOFNzqrL+HS4sbZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b09fa0f66671656ae55bdfd4587e49cae4f982a1bd24c4d6b27e8b5e61ed9696
Files
-
b09fa0f66671656ae55bdfd4587e49cae4f982a1bd24c4d6b27e8b5e61ed9696.exe windows:6 windows x64
Password: infected
b1e3b35ca846fbbe0a1fcd34fbd16e42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
urlmon
URLDownloadToFileW
kernel32
LocalFree
WriteProcessMemory
GetCurrentProcess
TerminateProcess
GetProcessId
ResumeThread
OpenProcess
CreateToolhelp32Snapshot
Sleep
Process32NextW
Process32FirstW
CloseHandle
GetNativeSystemInfo
Module32FirstW
VirtualProtectEx
GetThreadContext
GetProcAddress
VirtualAllocEx
ReadProcessMemory
CreateProcessW
GetModuleHandleW
Module32NextW
GetFileAttributesW
GetFileAttributesExW
GetTempPathW
AreFileApisANSI
GetLastError
GetLocaleInfoEx
GetFileInformationByHandleEx
MultiByteToWideChar
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
FormatMessageA
CreateDirectoryW
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
CreateFileW
FindClose
FindFirstFileW
user32
EnumWindows
SendMessageW
GetWindowThreadProcessId
LoadIconW
msvcp140
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?uncaught_exceptions@std@@YAHXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Xout_of_range@std@@YAXPEBD@Z
?_Winerror_map@std@@YAHH@Z
?_Xlength_error@std@@YAXPEBD@Z
?_Syserror_map@std@@YAPEBDH@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memset
_CxxThrowException
__C_specific_handler
__std_terminate
__std_exception_copy
__std_exception_destroy
__current_exception_context
memcpy
__current_exception
memmove
api-ms-win-crt-heap-l1-1-0
free
malloc
_callnewh
_set_new_mode
api-ms-win-crt-string-l1-1-0
_wcsicmp
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_register_onexit_function
terminate
_seh_filter_exe
_invalid_parameter_noinfo_noreturn
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
__p___argv
_set_app_type
_initialize_onexit_table
_exit
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
__p___argc
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
___lc_codepage_func
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
Sections
.text Size: 257KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ