Static task
static1
Behavioral task
behavioral1
Sample
09d3e92944092a137dd5faf83fd3185b8fc5a0570c96bcdb83aecde55cff9e0b.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
09d3e92944092a137dd5faf83fd3185b8fc5a0570c96bcdb83aecde55cff9e0b.exe
Resource
win10v2004-20231025-en
General
-
Target
09d3e92944092a137dd5faf83fd3185b8fc5a0570c96bcdb83aecde55cff9e0b
-
Size
263KB
-
MD5
db83fc1cc914c44335f27c7191382472
-
SHA1
57155327560b8c39763e499e2183aa2f0e361fc6
-
SHA256
09d3e92944092a137dd5faf83fd3185b8fc5a0570c96bcdb83aecde55cff9e0b
-
SHA512
e2ab70d09aecaf3c37d6b0b0d2cfd597a114aa80e3429fddb1fc88d3dee9117a280bf854f90f3aa880d2c1d3caa43bbe107195c1607c2f11038c199a39e3f5d8
-
SSDEEP
6144:aIRt/BDDtq8s8Kp4h7Sa5XWSFIAs3w6S7:aU/BDhq8O4huiXWS4C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09d3e92944092a137dd5faf83fd3185b8fc5a0570c96bcdb83aecde55cff9e0b
Files
-
09d3e92944092a137dd5faf83fd3185b8fc5a0570c96bcdb83aecde55cff9e0b.exe windows:5 windows x86
83fefe457ba26841bd4290a526d25ca3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CertCreateCertificateContext
CertOpenStore
CertAddCertificateContextToStore
CertCloseStore
CryptStringToBinaryA
CertFreeCertificateContext
ws2_32
listen
WSACleanup
setsockopt
recv
send
socket
inet_ntoa
htons
bind
inet_addr
accept
closesocket
WSAGetLastError
getaddrinfo
WSAStartup
gethostname
gethostbyname
iphlpapi
GetAdaptersInfo
GetIfEntry
winmm
timeGetTime
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
OpenProcessToken
OpenThreadToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
user32
ShowWindow
MessageBoxA
GetSystemMetrics
IsWindow
kernel32
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
SetStdHandle
GetStringTypeW
GetStringTypeA
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
SetEndOfFile
GetProcessHeap
CompareStringA
CompareStringW
GetUserDefaultLCID
InitializeCriticalSectionAndSpinCount
InterlockedExchange
SetConsoleCtrlHandler
GetTimeZoneInformation
SetFilePointer
CloseHandle
DeviceIoControl
CreateFileA
GetVersionExA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
GetSystemDirectoryA
GetSystemInfo
GetProcAddress
LoadLibraryA
Sleep
FreeLibrary
ReadFile
CreateProcessA
GetStartupInfoA
CreatePipe
GetModuleFileNameA
FreeResource
WriteFile
SizeofResource
LockResource
LoadResource
FindResourceA
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
CreateThread
GetLastError
DeleteFileA
InitializeCriticalSection
SetUnhandledExceptionFilter
DeleteCriticalSection
GetCurrentProcess
GetCurrentThread
GetCurrentProcessId
GetCurrentThreadId
GetFileType
SetHandleCount
GetConsoleMode
SetEnvironmentVariableA
GetConsoleCP
GetModuleHandleA
LCMapStringW
LCMapStringA
GetStdHandle
HeapReAlloc
VirtualAlloc
EnterCriticalSection
FatalAppExitA
LeaveCriticalSection
VirtualFree
HeapDestroy
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
RtlUnwind
HeapFree
HeapAlloc
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetTimeFormatA
GetDateFormatA
GetModuleHandleW
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCPInfo
libeay32
ord227
ssleay32
ord183
ord112
ord12
ord30
ord24
ord74
ord75
ord87
ord35
ord78
ord108
ord96
ord8
ord5
ord48
smcrypt
SM4Encrypt
Sections
.text Size: 214KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ