Static task
static1
Behavioral task
behavioral1
Sample
19fb37a3d75361e51ffcbf9c335420ed3b0574dc0ac023755aa4903cf08dd095.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
19fb37a3d75361e51ffcbf9c335420ed3b0574dc0ac023755aa4903cf08dd095.exe
Resource
win10v2004-20230915-en
General
-
Target
19fb37a3d75361e51ffcbf9c335420ed3b0574dc0ac023755aa4903cf08dd095
-
Size
719KB
-
MD5
19ac06b8863f5c7f230c2d3c64ac15f0
-
SHA1
766334aad691c9385e2fd1f53b2c9fd27c9640bb
-
SHA256
19fb37a3d75361e51ffcbf9c335420ed3b0574dc0ac023755aa4903cf08dd095
-
SHA512
5f5598c742c8223608fc5a0a588f40feeb3a8cc7581a3accb769427be731609364323da922ca1122c79adca56ca608faeb5e7337f8f8b8042c4a42d5c23a2128
-
SSDEEP
12288:i3OTUALPLJn07XRSfVB6e6h5z6pEDDr3zdypAbfdXDVyHU3UeW6:ie7R07hSdBzYCgDrDdSUftDVUE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19fb37a3d75361e51ffcbf9c335420ed3b0574dc0ac023755aa4903cf08dd095
Files
-
19fb37a3d75361e51ffcbf9c335420ed3b0574dc0ac023755aa4903cf08dd095.exe windows:6 windows x64
4ea69bba0beedccf32616dc9c738ad77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shlwapi
PathAppendW
PathFileExistsW
PathRemoveBackslashW
PathRemoveFileSpecW
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WTHelperGetProvCertFromChain
crypt32
CertGetNameStringW
kernel32
SetFilePointerEx
HeapSize
HeapReAlloc
FlushFileBuffers
HeapFree
CreateFileW
CloseHandle
HeapAlloc
GetProcAddress
GetProcessHeap
CreateDirectoryW
ReadFile
FindFirstFileW
SetLastError
GetCommandLineW
FindNextFileW
GetCurrentProcess
WriteFile
GetConsoleCP
GetModuleFileNameW
SetFilePointer
SetEndOfFile
GetTempPathW
FindClose
GetFileAttributesW
GetSystemDirectoryW
ProcessIdToSessionId
GetLastError
DeleteFileW
LoadLibraryW
MoveFileExW
GetFileSize
GetCurrentProcessId
FreeLibrary
CopyFileW
GetTempFileNameW
MoveFileW
LoadLibraryExW
GetWindowsDirectoryW
GetModuleHandleW
GetConsoleMode
WriteConsoleW
RemoveDirectoryW
GetStringTypeW
SetStdHandle
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
ExitProcess
GetModuleHandleExW
GetFileType
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
advapi32
RegCloseKey
ImpersonateLoggedOnUser
OpenProcessToken
RegOpenKeyExW
RegQueryValueExW
GetTokenInformation
RevertToSelf
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
ShellExecuteW
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE