Static task
static1
Behavioral task
behavioral1
Sample
23693479dca5b7300200792d6bbfe329308d52f6100d1429228fcae6cc73b7fb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
23693479dca5b7300200792d6bbfe329308d52f6100d1429228fcae6cc73b7fb.exe
Resource
win10v2004-20230915-en
General
-
Target
23693479dca5b7300200792d6bbfe329308d52f6100d1429228fcae6cc73b7fb
-
Size
178KB
-
MD5
09851c0cdda4e08e0327a7e867c5da34
-
SHA1
684db4260cf4b7b7037d56085fdda40a34dd100b
-
SHA256
23693479dca5b7300200792d6bbfe329308d52f6100d1429228fcae6cc73b7fb
-
SHA512
d933d23c4922b784f652161e0c7fc05b90efc5bdb570a812d10e07dc4ccdc781d9f5c02e49667a828db29b5626e7f6f7122a0e60ed6cf19d4db5032b8223aa69
-
SSDEEP
3072:MKVJ/18tjXqrM8+WD8YxjWvm/FtYVoq6jBk6Mo66WqB4bCe+:rVJNeXqrMPtY0v4Yuq9c66zDe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23693479dca5b7300200792d6bbfe329308d52f6100d1429228fcae6cc73b7fb
Files
-
23693479dca5b7300200792d6bbfe329308d52f6100d1429228fcae6cc73b7fb.exe windows:6 windows x86
3e70ebff39367c4790d51ae12e77b027
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionEx
lstrlenW
RaiseException
VerifyVersionInfoW
GetLastError
GetProcAddress
HeapSize
EnterCriticalSection
DecodePointer
lstrcmpiW
lstrcatW
DeleteCriticalSection
GetCurrentThreadId
CloseHandle
DeleteFileW
LocalFree
SetFileAttributesW
lstrcpyW
ConnectNamedPipe
CreateNamedPipeW
ReadFile
GetStartupInfoW
DisconnectNamedPipe
FlushFileBuffers
LCMapStringW
CreateThread
WaitForSingleObject
MultiByteToWideChar
TerminateThread
CreateEventW
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
GetOEMCP
GetACP
IsValidCodePage
lstrcmpW
CreateFileW
GetModuleFileNameW
LeaveCriticalSection
WriteFile
GetProcessHeap
GetModuleHandleW
CreateDirectoryW
HeapFree
GetCurrentProcess
MoveFileExW
HeapReAlloc
VerSetConditionMask
HeapAlloc
GetFileSize
SetEvent
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
GetCommandLineA
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
EncodePointer
GetStringTypeW
WideCharToMultiByte
OutputDebugStringW
IsDebuggerPresent
FindNextFileW
SetNamedPipeHandleState
FindClose
lstrcpynW
Sleep
WaitNamedPipeW
PeekNamedPipe
FindFirstFileW
lstrcpyA
CreateFileMappingW
GetTempPathW
UnmapViewOfFile
MapViewOfFile
user32
wsprintfW
advapi32
GetTokenInformation
RegisterServiceCtrlHandlerW
SetServiceStatus
StartServiceCtrlDispatcherW
RevertToSelf
ImpersonateLoggedOnUser
DuplicateTokenEx
CreateProcessAsUserW
RegCloseKey
RegOpenKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegQueryValueExW
shell32
ord75
ole32
CLSIDFromString
CoUninitialize
CoInitialize
shlwapi
StrChrW
PathFileExistsW
PathFindFileNameW
PathAppendW
wtsapi32
WTSQueryUserToken
WTSQuerySessionInformationW
WTSFreeMemory
WTSEnumerateSessionsW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ