Static task
static1
Behavioral task
behavioral1
Sample
792a281cd1f8cca6dd7ae95b52075792662b8daea07161b8f7aad8da5ce76df4.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
792a281cd1f8cca6dd7ae95b52075792662b8daea07161b8f7aad8da5ce76df4.exe
Resource
win10v2004-20231020-en
General
-
Target
792a281cd1f8cca6dd7ae95b52075792662b8daea07161b8f7aad8da5ce76df4
-
Size
178KB
-
MD5
7ed33d7393324fd70ec7f9e4664e8bb6
-
SHA1
8e7fc876fc794b8cd12e64325e33b37c5ec16876
-
SHA256
792a281cd1f8cca6dd7ae95b52075792662b8daea07161b8f7aad8da5ce76df4
-
SHA512
6ef1f2e63106c43cc86f609c54c97a203afe9d6afb5fc3912e6b642cda6ce0476b06e97e4b53d06a4f68f37ed176a77ff514525e5a998dea2781953c1e418b66
-
SSDEEP
3072:MKVJ/18tjXqrM8+WD8YxjWvm/FtYVoq6jBk6Mo66Wqr6bCe+:rVJNeXqrMPtY0v4Yuq9c66zne
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 792a281cd1f8cca6dd7ae95b52075792662b8daea07161b8f7aad8da5ce76df4
Files
-
792a281cd1f8cca6dd7ae95b52075792662b8daea07161b8f7aad8da5ce76df4.exe windows:6 windows x86
3e70ebff39367c4790d51ae12e77b027
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSectionEx
lstrlenW
RaiseException
VerifyVersionInfoW
GetLastError
GetProcAddress
HeapSize
EnterCriticalSection
DecodePointer
lstrcmpiW
lstrcatW
DeleteCriticalSection
GetCurrentThreadId
CloseHandle
DeleteFileW
LocalFree
SetFileAttributesW
lstrcpyW
ConnectNamedPipe
CreateNamedPipeW
ReadFile
GetStartupInfoW
DisconnectNamedPipe
FlushFileBuffers
LCMapStringW
CreateThread
WaitForSingleObject
MultiByteToWideChar
TerminateThread
CreateEventW
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
GetOEMCP
GetACP
IsValidCodePage
lstrcmpW
CreateFileW
GetModuleFileNameW
LeaveCriticalSection
WriteFile
GetProcessHeap
GetModuleHandleW
CreateDirectoryW
HeapFree
GetCurrentProcess
MoveFileExW
HeapReAlloc
VerSetConditionMask
HeapAlloc
GetFileSize
SetEvent
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
GetCommandLineA
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
EncodePointer
GetStringTypeW
WideCharToMultiByte
OutputDebugStringW
IsDebuggerPresent
FindNextFileW
SetNamedPipeHandleState
FindClose
lstrcpynW
Sleep
WaitNamedPipeW
PeekNamedPipe
FindFirstFileW
lstrcpyA
CreateFileMappingW
GetTempPathW
UnmapViewOfFile
MapViewOfFile
user32
wsprintfW
advapi32
GetTokenInformation
RegisterServiceCtrlHandlerW
SetServiceStatus
StartServiceCtrlDispatcherW
RevertToSelf
ImpersonateLoggedOnUser
DuplicateTokenEx
CreateProcessAsUserW
RegCloseKey
RegOpenKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegQueryValueExW
shell32
ord75
ole32
CLSIDFromString
CoUninitialize
CoInitialize
shlwapi
StrChrW
PathFileExistsW
PathFindFileNameW
PathAppendW
wtsapi32
WTSQueryUserToken
WTSQuerySessionInformationW
WTSFreeMemory
WTSEnumerateSessionsW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ