Static task
static1
Behavioral task
behavioral1
Sample
1733eacb1a312acd4b98a30ff99e885feeafdde9ab64ed22747a220d964fd10b.exe
Resource
win7-20230831-en
General
-
Target
1733eacb1a312acd4b98a30ff99e885feeafdde9ab64ed22747a220d964fd10b
-
Size
1.4MB
-
MD5
ea1632561fc22215db5c388d998b2144
-
SHA1
7492943fddc0ce952d7af8848173024843fa74b3
-
SHA256
1733eacb1a312acd4b98a30ff99e885feeafdde9ab64ed22747a220d964fd10b
-
SHA512
2633980ad9eb74ac08ded67a592207b361f563b2b0f89bed2eea1466cf7c0b2ce928224e6f87a9d84f299548a9dd0cecc2d3db837f3ab818be77c67d52ecbbe6
-
SSDEEP
24576:HxO2p3Iv6Q++VWsqjnhMgeiCl7G0nehbGZpbD:pmv6Q+AaDmg27RnWGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1733eacb1a312acd4b98a30ff99e885feeafdde9ab64ed22747a220d964fd10b
Files
-
1733eacb1a312acd4b98a30ff99e885feeafdde9ab64ed22747a220d964fd10b.exe windows:6 windows x86
10efc6a881ec58426f1eef221e43facf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htonl
htons
kernel32
LockResource
LoadResource
FindResourceW
FindResourceExW
CreateFileW
DeviceIoControl
CloseHandle
GetTickCount
WriteFile
SetFilePointer
ReadFile
WideCharToMultiByte
GetCurrentProcess
GetFileAttributesExW
GetLogicalDrives
GetDriveTypeW
GetDiskFreeSpaceExW
MoveFileW
GetLocalTime
FreeLibrary
GetCurrentThreadId
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
CreateThread
CreateToolhelp32Snapshot
SizeofResource
ProcessIdToSessionId
Process32NextW
OpenProcess
K32EnumProcesses
K32GetProcessImageFileNameW
RaiseException
InitializeCriticalSection
GetSystemInfo
GetVersionExW
VirtualQuery
GetSystemDefaultLangID
LoadLibraryA
SwitchToThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
Sleep
DeleteFileW
GetFileAttributesW
GetModuleHandleW
GetProcAddress
GetPrivateProfileSectionW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetCommandLineW
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Process32FirstW
InitializeSListHead
WaitForSingleObjectEx
ResetEvent
SetEvent
OutputDebugStringW
IsDebuggerPresent
advapi32
DuplicateTokenEx
LookupPrivilegeValueW
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegisterServiceCtrlHandlerExW
SetServiceStatus
StartServiceCtrlDispatcherW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CreateProcessAsUserW
shell32
SHCreateDirectoryExW
CommandLineToArgvW
SHGetSpecialFolderPathW
ole32
CoCreateGuid
shlwapi
PathAppendW
PathRemoveFileSpecW
PathFileExistsW
msvcp140
?_BADOFF@std@@3_JB
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z
?_Xbad_alloc@std@@YAXXZ
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Xbad_function_call@std@@YAXXZ
_Xtime_get_ticks
_Mtx_init_in_situ
_Mtx_destroy_in_situ
_Mtx_lock
_Mtx_unlock
?_Throw_C_error@std@@YAXH@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@G@Z
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
userenv
CreateEnvironmentBlock
wtsapi32
WTSQueryUserToken
psapi
GetProcessMemoryInfo
vcruntime140
wcsstr
__std_exception_copy
__std_exception_destroy
memmove
_purecall
wcsrchr
__std_terminate
_CxxThrowException
__CxxFrameHandler3
memcpy
memset
__vcrt_InitializeCriticalSectionEx
_except_handler4_common
api-ms-win-crt-string-l1-1-0
wcscpy_s
strnlen
toupper
wcsnlen
_wcsupr_s
_wcslwr_s
wmemcpy_s
_wcsicmp
wcsncpy_s
api-ms-win-crt-runtime-l1-1-0
_errno
_invalid_parameter_noinfo
_register_thread_local_exe_atexit_callback
_controlfp_s
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_cexit
terminate
_seh_filter_exe
_set_app_type
_invalid_parameter_noinfo_noreturn
_configure_wide_argv
_initialize_wide_environment
_get_wide_winmain_command_line
_initterm
_initterm_e
exit
_exit
_c_exit
api-ms-win-crt-heap-l1-1-0
_callnewh
_recalloc
free
_set_new_mode
malloc
calloc
api-ms-win-crt-locale-l1-1-0
localeconv
_configthreadlocale
api-ms-win-crt-convert-l1-1-0
strtod
_wtoi
strtoull
strtoll
api-ms-win-crt-filesystem-l1-1-0
_wsplitpath_s
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vsprintf
__p__commode
__stdio_common_vswprintf
__stdio_common_vswprintf_s
__stdio_common_vsprintf_s
__stdio_common_vswscanf
api-ms-win-crt-math-l1-1-0
__setusermatherr
_dsign
_dtest
Sections
.text Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE