Static task
static1
Behavioral task
behavioral1
Sample
2b1680a10f0691270e73967918e826493faebe59071c104e4cd5f31301571888.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2b1680a10f0691270e73967918e826493faebe59071c104e4cd5f31301571888.exe
Resource
win10v2004-20230915-en
General
-
Target
2b1680a10f0691270e73967918e826493faebe59071c104e4cd5f31301571888
-
Size
4.7MB
-
MD5
0c68b64a1eae62f6846ace3deb58bb28
-
SHA1
42d083c709685d91928660e19281bda672970ca8
-
SHA256
2b1680a10f0691270e73967918e826493faebe59071c104e4cd5f31301571888
-
SHA512
7b6530402e0fe87d26657a717a4db921d53bc5568a61655c0ac97982e66d9e43468ef79a1a2006cbfa7baaf2104b350999d9b1b1a3209d1ee97fde0da445da95
-
SSDEEP
49152:FYukvB3RfcjYftVUeMFBD5wVkmm4lbLlqT6UPCXfz3ptZnNs4T3Bet25T/ryMuF2:Yfd8etbRqTKXL/1x1TD2CiQvV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b1680a10f0691270e73967918e826493faebe59071c104e4cd5f31301571888
Files
-
2b1680a10f0691270e73967918e826493faebe59071c104e4cd5f31301571888.exe windows:6 windows x64
92e0606565e855167a92dd8b61e037ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetLastError
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
GetFileType
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
GetModuleHandleExW
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualFree
CreateProcessA
WideCharToMultiByte
GetACP
GetSystemDirectoryA
FreeLibrary
LoadLibraryA
FormatMessageA
LoadLibraryW
FindClose
FindFirstFileW
FindNextFileW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
SetEndOfFile
WriteConsoleW
HeapSize
GetTimeZoneInformation
GetStringTypeW
SetEnvironmentVariableW
lstrcmpiA
GetProcessHeap
GetComputerNameW
Beep
HeapAlloc
LoadResource
CloseHandle
Process32Next
LockResource
CreateFileA
GetLastError
GetTickCount64
Sleep
CreateToolhelp32Snapshot
SetCurrentDirectoryA
FreeResource
FindResourceA
CreateMutexW
WriteFile
HeapFree
Process32First
SizeofResource
GetEnvironmentVariableW
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
GetCurrentDirectoryW
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
HeapReAlloc
CreateDirectoryW
GetConsoleOutputCP
SetStdHandle
LCMapStringW
CompareStringW
FlsFree
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
SetConsoleCtrlHandler
ReadFile
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameW
FlsAlloc
FlsGetValue
FlsSetValue
user32
GetProcessWindowStation
MessageBoxA
MessageBoxW
GetUserObjectInformationW
advapi32
CryptCreateHash
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
DeregisterEventSource
CryptDecrypt
CryptExportKey
CryptGetUserKey
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertOpenStore
ws2_32
connect
closesocket
send
recv
WSASetLastError
getservbyname
getservbyport
socket
inet_ntoa
getsockopt
htons
htonl
WSAGetLastError
WSACleanup
WSAStartup
gethostbyname
select
ntohs
ioctlsocket
setsockopt
shutdown
gethostbyaddr
inet_addr
bcrypt
BCryptGenRandom
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 750KB - Virtual size: 750KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ