Static task
static1
Behavioral task
behavioral1
Sample
48afdb36d63a0cf4c28463a4c41cf94f208e246f3bea0fdc0752f8444dfaa924.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
48afdb36d63a0cf4c28463a4c41cf94f208e246f3bea0fdc0752f8444dfaa924.exe
Resource
win10v2004-20231023-en
General
-
Target
48afdb36d63a0cf4c28463a4c41cf94f208e246f3bea0fdc0752f8444dfaa924
-
Size
6.3MB
-
MD5
907c4bfc5015f6a589f36224a7904c2a
-
SHA1
f9644e136ff96e697373cc3750fa25f5252d977b
-
SHA256
48afdb36d63a0cf4c28463a4c41cf94f208e246f3bea0fdc0752f8444dfaa924
-
SHA512
2756ff4aae254d7c91340045837ebbd957e03db2d2a21000d5d01111e9080bb8b043c42c6938a523da32176af07f56b7579976fa1ef32f9644af162cfe6f3249
-
SSDEEP
49152:LhB3EZw53xwiXTFpj3lNV2TE2YHnAi2IBcsiNmqHm30Gm0a8DAPxMRzQNvuJtZnu:LqcyLYHwFnHmkMa8yM+NvC1x1uh9C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48afdb36d63a0cf4c28463a4c41cf94f208e246f3bea0fdc0752f8444dfaa924
Files
-
48afdb36d63a0cf4c28463a4c41cf94f208e246f3bea0fdc0752f8444dfaa924.exe windows:6 windows x64
42c08201feb84f3fb55e658f65fadcef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetModuleHandleExW
SetLastError
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
GetFileType
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
VirtualFree
CreateProcessA
WideCharToMultiByte
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentVariableW
GetACP
GetSystemDirectoryA
FreeLibrary
LoadLibraryA
FormatMessageA
LoadLibraryW
FindClose
FindFirstFileW
FindNextFileW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
SetEndOfFile
WriteConsoleW
HeapSize
GetTimeZoneInformation
GetStringTypeW
SetEnvironmentVariableW
lstrcmpiA
GetProcessHeap
GetComputerNameW
ExitProcess
Beep
HeapAlloc
LoadResource
CloseHandle
Process32Next
LockResource
CreateFileA
GetLastError
GetTickCount64
Sleep
CreateToolhelp32Snapshot
SetCurrentDirectoryA
FreeResource
FindResourceA
CreateMutexW
WriteFile
HeapFree
Process32First
SizeofResource
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
GetCurrentDirectoryW
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
HeapReAlloc
CreateDirectoryW
GetConsoleOutputCP
SetStdHandle
LCMapStringW
CompareStringW
FlsFree
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
SetConsoleCtrlHandler
ReadFile
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleFileNameW
FlsAlloc
FlsGetValue
FlsSetValue
user32
GetProcessWindowStation
MessageBoxA
MessageBoxW
GetUserObjectInformationW
advapi32
CryptCreateHash
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
DeregisterEventSource
CryptDecrypt
CryptExportKey
CryptGetUserKey
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertOpenStore
ws2_32
connect
closesocket
send
recv
WSASetLastError
getservbyname
getservbyport
socket
inet_ntoa
getsockopt
htons
htonl
WSAGetLastError
WSACleanup
WSAStartup
gethostbyname
select
ntohs
ioctlsocket
setsockopt
shutdown
gethostbyaddr
inet_addr
bcrypt
BCryptGenRandom
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 851KB - Virtual size: 850KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 515KB - Virtual size: 693KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ