Static task
static1
Behavioral task
behavioral1
Sample
dae420c4f0fe42603a8584e193d59985802532f75506bb9d826fbf48173e3ecb.exe
Resource
win7-20230831-en
General
-
Target
dae420c4f0fe42603a8584e193d59985802532f75506bb9d826fbf48173e3ecb
-
Size
2.3MB
-
MD5
c1354bd3556ef64ba9f1a524f91c8c6c
-
SHA1
b140fc62780efbf7e5047d8b10157a27c8802212
-
SHA256
dae420c4f0fe42603a8584e193d59985802532f75506bb9d826fbf48173e3ecb
-
SHA512
bbb28fc56494506ffe3ff0b287559981a529118ea4cded0858e6e6deefbd28dcd0e0122ff83f6ef27fb21779c6dff3b40b55047c0e110d96c479322b6449c7ac
-
SSDEEP
49152:KPH0oVz4anggggMBqfkK+Yzno3y3Z6pYfKP/hLdwCeRf8vpLd:WH0xajf7o3k3fghKId
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dae420c4f0fe42603a8584e193d59985802532f75506bb9d826fbf48173e3ecb
Files
-
dae420c4f0fe42603a8584e193d59985802532f75506bb9d826fbf48173e3ecb.exe windows:5 windows x86
c1831143150fac7b1fac3b6a559a12e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleMode
TryEnterCriticalSection
GetCurrentThreadId
QueryPerformanceCounter
QueryPerformanceFrequency
SetLastError
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
FormatMessageW
WideCharToMultiByte
InitializeCriticalSection
SleepEx
FreeLibrary
LoadLibraryW
GetSystemDirectoryW
Sleep
MoveFileExW
WaitForSingleObject
CompareFileTime
GetEnvironmentVariableA
WaitForMultipleObjects
GetFileType
GetStdHandle
PeekNamedPipe
VerSetConditionMask
VerifyVersionInfoW
ReleaseMutex
CreateMutexW
GetCommandLineW
LockResource
LoadResource
SizeofResource
FindResourceW
FindClose
GetSystemTime
GetNativeSystemInfo
FindFirstFileW
FindNextFileW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
LocalFree
GetVersionExW
GetLogicalDriveStringsW
GetEnvironmentVariableW
GetDriveTypeW
GetCurrentProcess
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SwitchToFiber
MoveFileW
VirtualQuery
DeviceIoControl
GetSystemDirectoryA
LocalAlloc
OpenProcess
FindResourceExW
SetEvent
ResetEvent
TerminateProcess
VirtualAlloc
VirtualFree
VirtualProtect
LoadLibraryA
IsBadReadPtr
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
EncodePointer
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlUnwind
GetFileAttributesExW
ExitThread
GetModuleHandleExW
SetFilePointerEx
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
ExitProcess
GetACP
ReadConsoleW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStringTypeW
FlushFileBuffers
SetStdHandle
SetEndOfFile
GetCurrentDirectoryW
GetFullPathNameW
WriteConsoleW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
DeleteFiber
CreateFiber
GlobalMemoryStatus
ConvertFiberToThread
ReadConsoleA
ConvertThreadToFiber
SystemTimeToFileTime
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
IsDebuggerPresent
CreateFileA
CreateDirectoryW
MultiByteToWideChar
DeleteFileW
CreateFileW
CloseHandle
ReadFile
WriteFile
GetFileSize
GetCurrentProcessId
GetModuleFileNameW
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DecodePointer
user32
DefWindowProcW
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
advapi32
RegCloseKey
LookupAccountSidW
GetTokenInformation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
AllocateAndInitializeSid
GetUserNameW
SetEntriesInAclW
OpenProcessToken
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
DeregisterEventSource
CryptGenRandom
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
ole32
CoUninitialize
CoInitialize
shlwapi
PathFileExistsW
SHDeleteKeyW
PathCombineW
PathFindFileNameW
PathRemoveFileSpecW
urlmon
ObtainUserAgentString
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
psapi
EnumProcesses
GetProcessImageFileNameW
shell32
CommandLineToArgvW
SHGetFolderPathW
crypt32
CertFindCertificateInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertOpenStore
CertCloseStore
CertFreeCertificateContext
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertEnumCertificatesInStore
CertOpenSystemStoreW
ws2_32
gethostname
sendto
recvfrom
WSAEventSelect
WSACreateEvent
WSACloseEvent
freeaddrinfo
getaddrinfo
shutdown
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSAGetLastError
send
recv
closesocket
getnameinfo
WSAEnumNetworkEvents
wldap32
ord133
ord79
ord147
ord301
ord142
ord167
ord127
ord27
ord26
ord145
ord219
ord46
ord14
ord216
ord208
ord41
ord117
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 480KB - Virtual size: 479KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 142KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE