Static task
static1
Behavioral task
behavioral1
Sample
18d319c9222d1274b5e01b0e5671a8be0208a06bf4bb5fb1ce9f8060539ae0d3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
18d319c9222d1274b5e01b0e5671a8be0208a06bf4bb5fb1ce9f8060539ae0d3.exe
Resource
win10v2004-20230915-en
General
-
Target
18d319c9222d1274b5e01b0e5671a8be0208a06bf4bb5fb1ce9f8060539ae0d3
-
Size
1.5MB
-
MD5
c4c79c2af093cb5ebb2b21374e0c7c85
-
SHA1
5544f7b824155cd2aa6daf0be6ebc63fbf922d00
-
SHA256
18d319c9222d1274b5e01b0e5671a8be0208a06bf4bb5fb1ce9f8060539ae0d3
-
SHA512
cbc1444d31486679e93678de7918cab421cc411b75232831a5f95f97dd3a977b075f714ced28f1853ac56980bde17875dbebd3b74232e0b9711caecaad273b5a
-
SSDEEP
24576:P0J4aTPlBMRC+adPw74VCvJF4IySgQCYjIPRhXxj7ekxcicBNwFmPUwqHKH+ulfk:P0J4aTddq4VCvJF4IySgQCYjIPRhdYgH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18d319c9222d1274b5e01b0e5671a8be0208a06bf4bb5fb1ce9f8060539ae0d3
Files
-
18d319c9222d1274b5e01b0e5671a8be0208a06bf4bb5fb1ce9f8060539ae0d3.exe windows:4 windows x86
2105ef12f12909f97e833064226f8e95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
GetFileAttributesA
GetFullPathNameA
GetSystemTime
FileTimeToSystemTime
GetTimeZoneInformation
GetProcAddress
LoadLibraryA
AreFileApisANSI
CloseHandle
GetLastError
WaitForSingleObject
GetExitCodeProcess
OpenProcess
FreeLibrary
GetStdHandle
GetConsoleMode
Sleep
VerSetConditionMask
IsWow64Process
FormatMessageA
GetProfileStringA
VerifyVersionInfoW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateDirectoryA
CreateFileA
DeleteFileA
RemoveDirectoryA
SetFileTime
FlushFileBuffers
GetFileSizeEx
GetFileTime
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
ExitProcess
TlsAlloc
TlsGetValue
TlsSetValue
LocalAlloc
LocalFree
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
OpenFileMappingA
GetPrivateProfileIntA
GetEnvironmentVariableA
WritePrivateProfileStringA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
CreateEventA
WaitForMultipleObjects
IsBadWritePtr
GetSystemTimeAsFileTime
FindClose
FindFirstFileA
FindNextFileA
ReleaseSemaphore
CreateSemaphoreA
OpenSemaphoreA
FlushInstructionCache
VirtualProtect
DeviceIoControl
LockFile
UnlockFile
IsBadStringPtrA
IsBadStringPtrW
GetDriveTypeA
WideCharToMultiByte
MultiByteToWideChar
MapViewOfFileEx
ReleaseMutex
CreateMutexA
SwitchToThread
GetProcessTimes
SetEnvironmentVariableA
ReadConsoleW
CreateFileW
WriteConsoleW
SetStdHandle
OutputDebugStringW
SetFilePointerEx
GetCurrentProcess
GetConsoleCP
HeapReAlloc
GetModuleFileNameW
GetOEMCP
IsValidCodePage
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
IsBadReadPtr
GetComputerNameA
GetWindowsDirectoryA
GetSystemDirectoryA
GetSystemInfo
SetLastError
GetModuleHandleA
GetModuleFileNameA
VirtualQuery
SetPriorityClass
TlsFree
SetThreadPriority
GetCurrentThread
TerminateProcess
GetProcessHeap
HeapFree
HeapAlloc
GetCurrentDirectoryA
SetConsoleCtrlHandler
OpenEventA
SetEvent
GetACP
SystemTimeToFileTime
GetTempPathA
GetLocalTime
GetDiskFreeSpaceA
GetUserDefaultUILanguage
GetExitCodeThread
GetCurrentThreadId
DuplicateHandle
GetTickCount
GetVersionExA
GetVersion
GetCurrentProcessId
GetPrivateProfileStringA
IsDebuggerPresent
LoadLibraryExW
GetCPInfo
GetModuleHandleExW
GetStartupInfoW
GetFileType
RtlUnwind
RaiseException
GetStringTypeW
DecodePointer
EncodePointer
user32
GetSystemMenu
AppendMenuA
LoadStringA
wsprintfA
DrawMenuBar
TranslateMessage
DispatchMessageA
GetSystemMetrics
MessageBoxA
CharLowerBuffA
CharUpperBuffA
CallMsgFilterA
PeekMessageA
shell32
ShellExecuteExA
advapi32
ReadEventLogA
StartServiceA
QueryServiceStatus
QueryServiceConfigA
OpenServiceA
OpenSCManagerA
CloseServiceHandle
RegFlushKey
RegDeleteKeyA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
GetUserNameA
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
OpenEventLogA
CloseEventLog
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
ws2_32
WSAStartup
freeaddrinfo
getaddrinfo
gethostname
WSACleanup
gethostbyname
sendto
recvfrom
inet_addr
bind
getpeername
WSAGetLastError
socket
shutdown
setsockopt
send
select
recv
getsockopt
ioctlsocket
connect
closesocket
accept
__WSAFDIsSet
gethostbyaddr
inet_ntoa
htons
Sections
__wibu00 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
__wibu01 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
__wibu02 Size: 4KB - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
__wibu03 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
__wibu04 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
__wibu05 Size: 48KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
__wibu06 Size: 116KB - Virtual size: 116KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE