Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20230915-en
General
-
Target
3484e16cc484d63555e17cb8f584bfb8c62ce747a5c075c6ca78d40861878b21.bin.sample.gz
-
Size
130KB
-
MD5
153144dcc685f3cad53a5b9f23d25fea
-
SHA1
b64fc5b2eb9040eada081e3b598c75e3817c64ad
-
SHA256
33ff257d311735a6d1d25944bd78c526fb32e29958ae908c4659361f16b48596
-
SHA512
00c2988391971df0974a640466842a6e97955abbe28344d1cedb3f209773cae2f7aae44d18d75ecb8e7aba060a80eda4409b5a3284ae2ef695e6eb85258f8d4e
-
SSDEEP
3072:4pVCxK8jRnBk8IDeg7D5DmcMRhrEqBvxd5api+W6BRrD9goZN:4pVCxK46wsl9MzrRrU0cR9VN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/sample
Files
-
3484e16cc484d63555e17cb8f584bfb8c62ce747a5c075c6ca78d40861878b21.bin.sample.gz.gz
-
sample.exe windows:5 windows x64
ab07cff37100c2231d70a9e007fc69de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
version
VerQueryValueA
kernel32
GetModuleHandleA
LoadLibraryA
FreeLibrary
ExpandEnvironmentStringsA
WriteConsoleW
SetStdHandle
OutputDebugStringW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
LCMapStringW
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetFileType
GetProcessHeap
LoadLibraryExW
GetModuleFileNameW
GetStdHandle
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
TerminateProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RtlUnwindEx
HeapSize
HeapFree
GetCurrentThreadId
SetLastError
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
RtlPcToFileHeader
HeapAlloc
GetCommandLineA
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
ExitProcess
GetLastError
DecodePointer
EncodePointer
Sleep
DeleteFileA
LockResource
LoadResource
FindResourceA
lstrcmpA
SetEndOfFile
WriteFile
FlushFileBuffers
lstrcpynA
QueryPerformanceCounter
QueryPerformanceFrequency
CreateThread
SetFilePointer
GetUserDefaultLangID
GetVersionExA
CloseHandle
ReadFile
GetFileSize
CreateFileA
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
GetTickCount
ReadConsoleW
TlsAlloc
CreateFileW
user32
LoadKeyboardLayoutA
UpdateWindow
LoadAcceleratorsA
GetClientRect
RegisterClassA
LoadIconA
DefDlgProcA
GetMessageA
IsDialogMessageA
TranslateAcceleratorA
GetFocus
DialogBoxParamA
GetKeyState
DrawFrameControl
CheckRadioButton
TranslateMessage
PostQuitMessage
ReleaseCapture
SetCapture
LoadCursorA
SetCursor
IsIconic
IsZoomed
SetWindowLongPtrA
GetSystemMetrics
ReleaseDC
GetDC
LockWindowUpdate
CreateWindowExA
MapDialogRect
SetRect
CallWindowProcA
ToAscii
GetKeyboardState
FillRect
InvalidateRect
DrawTextA
GetDialogBaseUnits
EndDeferWindowPos
BeginDeferWindowPos
DeferWindowPos
ScreenToClient
DrawFocusRect
EndDialog
GetDlgItemTextA
IsDlgButtonChecked
AppendMenuA
CreatePopupMenu
GetMenuStringA
GetWindowTextA
CheckDlgButton
MapWindowPoints
GetDlgItem
SetFocus
GetWindowTextLengthA
SendMessageA
MessageBoxA
SetDlgItemInt
GetDlgItemInt
PeekMessageA
MsgWaitForMultipleObjects
PostMessageA
SetDlgItemTextA
DestroyMenu
SetMenu
GetMenu
LoadMenuA
SetMenuItemInfoA
GetSubMenu
DeleteMenu
InsertMenuA
InsertMenuW
GetMenuItemID
GetMenuItemCount
SetWindowPos
DestroyWindow
ShowWindow
MoveWindow
GetWindowRect
CreateDialogParamA
EnumChildWindows
SetWindowTextA
GetDlgCtrlID
DispatchMessageA
gdi32
SetBkMode
SelectObject
GetStockObject
Rectangle
GetTextMetricsA
CreateSolidBrush
DeleteObject
GetDeviceCaps
GetTextExtentPoint32A
SetTextColor
CreateFontIndirectA
comdlg32
ChooseFontA
GetOpenFileNameA
CommDlgExtendedError
GetSaveFileNameA
ChooseColorA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyA
RegDeleteKeyA
shell32
ShellExecuteA
Sections
.text Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ