Static task
static1
Behavioral task
behavioral1
Sample
3392c836160c33940b30f6a8780da715e58c35ed4cb3640606f94ad098970b18.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3392c836160c33940b30f6a8780da715e58c35ed4cb3640606f94ad098970b18.exe
Resource
win10v2004-20230915-en
General
-
Target
3392c836160c33940b30f6a8780da715e58c35ed4cb3640606f94ad098970b18
-
Size
2.5MB
-
MD5
c6eff51d7ff7ce398168721bb86553e8
-
SHA1
f69550e6066ca8a4fe1194e32eb3226fe36d406b
-
SHA256
3392c836160c33940b30f6a8780da715e58c35ed4cb3640606f94ad098970b18
-
SHA512
ad17df3af6d38d30415dc493d8e5d7db5f763a776c13d5c6c62c3bb8c01d05163526871087126b933c7fbe7b139c7c1d92fba62ccfbf442322eafe2914d43d6b
-
SSDEEP
49152:dBaV9fjufJPd2RWtjTEYWAsiLI1FPyLapjkcFX7i78rOvxO826ilRBr:dojfjuVdARA+F3jkcti4rOvp2llRBr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3392c836160c33940b30f6a8780da715e58c35ed4cb3640606f94ad098970b18
Files
-
3392c836160c33940b30f6a8780da715e58c35ed4cb3640606f94ad098970b18.exe windows:6 windows x86
7ffd357d1a473b2336868ec0c8533f5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DecodePointer
GetSystemInfo
lstrcatW
DeleteCriticalSection
GetCurrentThreadId
CloseHandle
DeleteFileW
LocalFree
SetFileAttributesW
lstrcpyW
CreateMutexW
FindFirstFileW
MapViewOfFile
UnmapViewOfFile
Sleep
ReadFile
WritePrivateProfileStringW
FindClose
CreateFileMappingW
FindNextFileW
ReleaseMutex
GetDriveTypeW
FlushInstructionCache
SetLastError
lstrcmpiA
DeviceIoControl
GlobalReAlloc
CreateThread
GlobalFree
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
lstrcmpW
GetModuleFileNameA
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
GetOEMCP
GetACP
IsValidCodePage
LCMapStringW
GetStartupInfoW
EnterCriticalSection
HeapSize
GetProcAddress
GetLastError
VerifyVersionInfoW
RaiseException
GlobalUnlock
lstrlenW
InitializeCriticalSectionEx
MultiByteToWideChar
CreateFileW
GetModuleFileNameW
MulDiv
LeaveCriticalSection
HeapReAlloc
LoadLibraryW
GlobalAlloc
WriteFile
GetProcessHeap
GetModuleHandleW
GlobalLock
CreateDirectoryW
HeapFree
GetCurrentProcess
MoveFileExW
VerSetConditionMask
HeapAlloc
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
GetCommandLineA
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
WideCharToMultiByte
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
OutputDebugStringW
IsDebuggerPresent
SetNamedPipeHandleState
WaitNamedPipeW
PeekNamedPipe
QueryPerformanceCounter
user32
ReleaseDC
GetDesktopWindow
CreateWindowExW
MessageBoxW
SendMessageW
LoadImageW
DialogBoxIndirectParamW
GetDlgItem
SetWindowLongW
EndDialog
SendDlgItemMessageW
ShowWindow
GetActiveWindow
GetDlgItemTextW
SetDlgItemTextW
EnableWindow
GetDlgCtrlID
ExitWindowsEx
MapDialogRect
UnregisterClassW
wsprintfW
GetDC
gdi32
SetBkColor
DeleteObject
CreateSolidBrush
CreateFontIndirectW
GetDeviceCaps
GetObjectW
SetTextColor
advapi32
RegOpenKeyExW
RegCreateKeyExW
AdjustTokenPrivileges
ControlService
RegDeleteTreeW
QueryServiceStatus
StartServiceW
LookupPrivilegeValueW
OpenServiceW
OpenSCManagerW
DeleteService
OpenProcessToken
CloseServiceHandle
CreateServiceW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteKeyW
RegQueryValueExW
shell32
ord75
SHGetPathFromIDListW
SHGetSpecialFolderPathW
SHFileOperationW
SHChangeNotify
SHBrowseForFolderW
ole32
CLSIDFromString
CoCreateInstance
CoInitialize
CoTaskMemFree
CoInitializeEx
CoUninitialize
shlwapi
PathRemoveFileSpecW
PathAppendW
PathFileExistsW
PathFindFileNameW
StrStrW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
comctl32
ord17
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ