Static task
static1
Behavioral task
behavioral1
Sample
b2db49e70d7fe069d43e7251de2f4aa2a56e58837e1a23a3b0b2f6bcd1a19681.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b2db49e70d7fe069d43e7251de2f4aa2a56e58837e1a23a3b0b2f6bcd1a19681.exe
Resource
win10v2004-20230915-en
General
-
Target
b2db49e70d7fe069d43e7251de2f4aa2a56e58837e1a23a3b0b2f6bcd1a19681
-
Size
584KB
-
MD5
ea400276bf0c10e4d1ac2c9205dd61c8
-
SHA1
38eec435af75bb93ffe4be1bd3188f81eab27465
-
SHA256
b2db49e70d7fe069d43e7251de2f4aa2a56e58837e1a23a3b0b2f6bcd1a19681
-
SHA512
e565d5ff699c03667cc39e51c728f57e22cdcf8b0ca280405a9cd1181659694a61ee46ffc42255e5cd0090a292f72178c4b6abe1f01eaee4c809b609efdbbf13
-
SSDEEP
12288:p55QCqbwgc0AD0qQP6GiggggM1Ho/GPPcDDQDfkSehzdduH7zSU6Q93EIu4F1IRj:yMAiggggM1dPPyQww/SU6u3Bx1IRj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b2db49e70d7fe069d43e7251de2f4aa2a56e58837e1a23a3b0b2f6bcd1a19681
Files
-
b2db49e70d7fe069d43e7251de2f4aa2a56e58837e1a23a3b0b2f6bcd1a19681.exe windows:5 windows x86
1be6f0a6aecd101269e5c078c4c928ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
FindClose
GetNativeSystemInfo
FindFirstFileW
FindNextFileW
DeleteFileW
GetCurrentProcessId
VirtualQuery
MoveFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateDirectoryW
GetFileSize
WriteFile
ReadFile
GetModuleHandleW
CreateFileA
DeviceIoControl
GetSystemDirectoryA
GlobalFree
VirtualAlloc
VirtualFree
LoadLibraryW
SetLastError
LoadLibraryA
IsBadReadPtr
IsDebuggerPresent
OutputDebugStringW
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetLogicalDriveStringsW
TerminateProcess
GetCurrentProcess
OpenProcess
LocalFree
LocalAlloc
GetProcAddress
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
GetCurrentThreadId
GetCommandLineW
CreateMutexW
CloseHandle
ReleaseMutex
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DecodePointer
GetOEMCP
IsValidCodePage
FindFirstFileExW
WriteConsoleW
ReadConsoleW
SetEndOfFile
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetACP
GetStdHandle
GetModuleHandleExW
ExitProcess
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetFileType
GetTimeZoneInformation
RtlUnwind
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
VirtualProtect
Sleep
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
LoadLibraryExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
TryEnterCriticalSection
GetStringTypeW
QueryPerformanceCounter
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
user32
DefWindowProcW
advapi32
GetUserNameW
RegSetValueExW
SetEntriesInAclW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
LookupAccountSidW
FreeSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
ole32
CoUninitialize
CoInitialize
shell32
SHGetFolderPathW
CommandLineToArgvW
shlwapi
PathRemoveFileSpecW
PathFileExistsW
PathCombineW
PathFindFileNameW
psapi
EnumProcesses
GetProcessImageFileNameW
urlmon
ObtainUserAgentString
winhttp
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpCrackUrl
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpOpen
WinHttpWriteData
Sections
.text Size: 419KB - Virtual size: 419KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ