Static task
static1
Behavioral task
behavioral1
Sample
89d85f51567bb677b28d69e13649d83e29ba68d73aa6f217675dbd979a85f83b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
89d85f51567bb677b28d69e13649d83e29ba68d73aa6f217675dbd979a85f83b.exe
Resource
win10v2004-20230915-en
General
-
Target
89d85f51567bb677b28d69e13649d83e29ba68d73aa6f217675dbd979a85f83b
-
Size
844KB
-
MD5
d7c5b551bd8daaa854d10117c88f4f49
-
SHA1
881ef09f2657b109519e09a4b87b9d58db944fa9
-
SHA256
89d85f51567bb677b28d69e13649d83e29ba68d73aa6f217675dbd979a85f83b
-
SHA512
cd63fdc777020a8443a2a06d69479860e88694548683cb5f63180a924194f49f943c7ba17141fc39316636b40e9d857dabd3b592f5324983a15c42cec5782c9d
-
SSDEEP
12288:a8T7Cm/3FRjp9kcNzZZ0AyH9f30tBAzAn:zT7V/jDkcBZGAyd/0tBJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89d85f51567bb677b28d69e13649d83e29ba68d73aa6f217675dbd979a85f83b
Files
-
89d85f51567bb677b28d69e13649d83e29ba68d73aa6f217675dbd979a85f83b.exe windows:6 windows x64
20e2dfc5b9e4b1511efa9b1ff5c43f6f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetConsoleOutputCP
HeapSize
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
CreateMutexW
GetLastError
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
GetModuleHandleA
FlsAlloc
GetStringTypeW
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
WriteFile
FreeEnvironmentStringsW
ReleaseMutex
FindClose
ReleaseSRWLockShared
CompareStringOrdinal
AddVectoredExceptionHandler
SetThreadStackGuarantee
SwitchToThread
GetCurrentProcess
GetCurrentThread
RtlCaptureContext
GetProcAddress
RtlLookupFunctionEntry
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
SetEnvironmentVariableW
LoadLibraryExW
GetCommandLineW
FlushFileBuffers
SetFileInformationByHandle
DuplicateHandle
SetFilePointerEx
FreeLibrary
TlsFree
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
GetStdHandle
GetCurrentProcessId
RtlPcToFileHeader
RtlUnwindEx
WriteFileEx
SleepEx
ReadFileEx
WaitForSingleObject
GetExitCodeProcess
TerminateProcess
TryAcquireSRWLockExclusive
QueryPerformanceCounter
QueryPerformanceFrequency
HeapAlloc
GetProcessHeap
HeapFree
IsProcessorFeaturePresent
HeapReAlloc
AcquireSRWLockShared
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
FindNextFileW
CreateFileW
GetFileInformationByHandle
GetFileInformationByHandleEx
GetStartupInfoW
SetUnhandledExceptionFilter
CreateDirectoryW
FindFirstFileW
CreateEventW
ReadFile
GetOverlappedResult
CancelIo
UnhandledExceptionFilter
IsDebuggerPresent
GetConsoleMode
GetFileType
RtlVirtualUnwind
InitializeSListHead
GetCurrentThreadId
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
ExitProcess
GetFullPathNameW
CloseHandle
CreateNamedPipeW
WaitForMultipleObjects
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
ReleaseSRWLockExclusive
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
CreateThread
TlsGetValue
TlsSetValue
GetSystemTimeAsFileTime
RaiseException
AcquireSRWLockExclusive
user32
TrackPopupMenu
DefWindowProcW
GetCursorPos
SetForegroundWindow
PostQuitMessage
PostMessageW
InsertMenuItemW
LoadIconW
LoadCursorW
RegisterClassW
CreateWindowExW
GetMenuItemID
CreatePopupMenu
SetMenuInfo
GetMessageW
TranslateMessage
DispatchMessageW
LoadImageW
shell32
Shell_NotifyIconW
advapi32
SystemFunction036
ntdll
NtWriteFile
RtlNtStatusToDosError
NtReadFile
bcrypt
BCryptGenRandom
Sections
.text Size: 604KB - Virtual size: 604KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ