Static task
static1
Behavioral task
behavioral1
Sample
1b06e50016e09c714776a1654f8825df4d8b52ec77aade2c7e8a8e72347b38ee.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1b06e50016e09c714776a1654f8825df4d8b52ec77aade2c7e8a8e72347b38ee.exe
Resource
win10v2004-20231023-en
General
-
Target
1b06e50016e09c714776a1654f8825df4d8b52ec77aade2c7e8a8e72347b38ee
-
Size
765KB
-
MD5
955fd054ff0b24c8f34cbc348b1a2872
-
SHA1
d45b60228345012612a3c5ed0bca0d792513bc04
-
SHA256
1b06e50016e09c714776a1654f8825df4d8b52ec77aade2c7e8a8e72347b38ee
-
SHA512
d21cab084ba5f99a88bfce04959361dfab3513222e51e27e5dd0c309be07889626b76608eb0a439515d72aff3ee5a0c3cd24ac3ca62d2326beface0ccec7cb61
-
SSDEEP
12288:/+KX485Rg+Kf2VkCXA7JJ8tLCqffyhMD9WPSHArCzrEJgHZOyxJX3vUzZs50cXPT:ksb3vUd+0lRgPG8iVCqUFXhH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b06e50016e09c714776a1654f8825df4d8b52ec77aade2c7e8a8e72347b38ee
Files
-
1b06e50016e09c714776a1654f8825df4d8b52ec77aade2c7e8a8e72347b38ee.exe windows:5 windows x86
7cb300e0af3f9134d947395bbeeb74b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedCompareExchange
Sleep
OpenMutexW
WaitForSingleObject
MapViewOfFile
CreateFileMappingW
SetEvent
GetLastError
CreateEventW
UnmapViewOfFile
OpenEventW
VirtualQuery
GetCurrentProcessId
GetLocalTime
CloseHandle
GetCurrentThreadId
InterlockedExchange
CreateFileW
EncodePointer
DecodePointer
RaiseException
IsProcessorFeaturePresent
QueueUserWorkItem
GetModuleHandleExW
FormatMessageW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
DuplicateHandle
WaitForSingleObjectEx
GetCurrentProcess
GetCurrentThread
QueryPerformanceCounter
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
QueryDosDeviceW
SearchPathW
ExpandEnvironmentStringsW
GetEnvironmentVariableW
LocalFree
ResetEvent
GetACP
MultiByteToWideChar
CreateMutexW
ReleaseMutex
InitializeCriticalSection
GetVersionExW
LockResource
LoadResource
FindResourceW
lstrcmpiW
TerminateProcess
FindNextFileW
FindClose
ReadFile
GetFileSize
CreateDirectoryW
GetFullPathNameW
lstrlenW
SetFilePointer
GetTempPathW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
GetWindowsDirectoryW
GetTempFileNameW
HeapFree
HeapAlloc
GetProcessHeap
GetLogicalDriveStringsW
LoadLibraryW
FreeLibrary
LoadLibraryExW
InterlockedExchangeAdd
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
UnregisterWait
UnregisterWaitEx
ReadProcessMemory
GetProcessTimes
RegisterWaitForSingleObject
CreateNamedPipeW
DisconnectNamedPipe
GetOverlappedResult
ConnectNamedPipe
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
RtlUnwind
ExitProcess
GetStdHandle
GetStringTypeW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
WriteConsoleW
HeapSize
HeapReAlloc
Thread32Next
Thread32First
SuspendThread
CreateToolhelp32Snapshot
OpenThread
GetModuleFileNameW
WriteFile
GetTickCount
WaitForMultipleObjects
GlobalMemoryStatusEx
RemoveDirectoryW
OpenProcess
user32
GetWindowThreadProcessId
FindWindowExW
IsIconic
ShowWindow
SendMessageW
IsWindowVisible
IsWindow
SetForegroundWindow
advapi32
RegisterServiceCtrlHandlerExW
SetServiceStatus
StartServiceCtrlDispatcherW
psapi
GetProcessMemoryInfo
Sections
.text Size: 447KB - Virtual size: 447KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ