Static task
static1
Behavioral task
behavioral1
Sample
80795aa2156430413a75513552951750.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
80795aa2156430413a75513552951750.exe
Resource
win10v2004-20231023-en
General
-
Target
80795aa2156430413a75513552951750.bin
-
Size
36.9MB
-
MD5
80795aa2156430413a75513552951750
-
SHA1
346638c155a2b674ca93dfeeb8806658907c7483
-
SHA256
34728f9a9951265e5889de7f72a626b5e79338a27fbf413c8fe3676d4e7b0586
-
SHA512
93de1de6d71a16fece701b8a7583d0064a3de27a633b8ee255a4b451c1d7017aac271f1bf3d67b7cd855610ae21a53cd3cf7f859ad74f6524b6de829686657d1
-
SSDEEP
786432:eNizzzzvlEbzrUN3iYYfUrVZrwvXppF00:K7UN3sUr/yppFR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 80795aa2156430413a75513552951750.bin
Files
-
80795aa2156430413a75513552951750.bin.exe windows:6 windows x86
a22ce5d045a66c09ea9f70662df10bbd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
GetFileAttributesExW
SetEvent
GetOEMCP
HeapFree
SetStdHandle
TlsSetValue
IsValidLocale
SetPriorityClass
AcquireSRWLockExclusive
LoadLibraryA
QueryPerformanceCounter
LCMapStringW
GetSystemDirectoryW
GetLastError
lstrcatW
GetProcessAffinityMask
LocalFree
InitializeCriticalSection
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcessId
ReleaseSemaphore
CloseHandle
VerifyVersionInfoW
FindFirstFileA
GetTimeFormatW
MoveFileExW
WideCharToMultiByte
GetCommandLineW
GlobalAlloc
VirtualAlloc
Sleep
GetCurrentThreadId
ExitProcess
WriteFile
GetCPInfo
GetLogicalDriveStringsA
EncodePointer
WriteConsoleW
CreateDirectoryW
FileTimeToSystemTime
GlobalMemoryStatus
LCMapStringEx
SetFileTime
GetFileSize
CreateEventA
RtlUnwind
GetFullPathNameW
VerSetConditionMask
GetFileAttributesW
CreateDirectoryA
FindFirstFileExW
GetVersionExA
CreateFileA
SetUnhandledExceptionFilter
GetFileInformationByHandle
GetConsoleMode
FormatMessageW
FormatMessageA
WaitForSingleObject
GetDriveTypeW
InitializeCriticalSectionAndSpinCount
GetFileSizeEx
GetDateFormatW
GetLocaleInfoW
SetFilePointer
SleepEx
LeaveCriticalSection
MoveFileA
DeleteCriticalSection
lstrlenA
LoadLibraryW
WaitForMultipleObjects
GetConsoleOutputCP
GlobalLock
HeapReAlloc
MoveFileW
CompareFileTime
FileTimeToLocalFileTime
SystemTimeToTzSpecificLocalTime
SetFilePointerEx
TerminateProcess
DecodePointer
FindNextFileA
ExitThread
DeleteFileA
CompareStringW
GetSystemTimeAsFileTime
GetModuleHandleA
GetModuleHandleW
LoadLibraryExW
GetFileAttributesA
InitializeSListHead
ReleaseSRWLockExclusive
PeekNamedPipe
ResetEvent
HeapAlloc
HeapSize
FreeLibrary
SetLastError
TlsAlloc
QueryPerformanceFrequency
DeleteFileW
GetUserDefaultLCID
FindFirstFileW
GetModuleHandleExW
GetLogicalDriveStringsW
EnterCriticalSection
GetSystemWow64DirectoryW
GetFileType
VirtualFree
lstrlenW
TlsFree
IsDebuggerPresent
GetTickCount64
SetEnvironmentVariableW
RemoveDirectoryW
RaiseException
GetCurrentDirectoryW
GlobalUnlock
GetSystemInfo
GetTimeZoneInformation
GetProcAddress
GetModuleFileNameW
FreeLibraryAndExitThread
GetEnvironmentStringsW
TlsGetValue
lstrcatA
FlushFileBuffers
SetFileAttributesA
CreateThread
GetProcessHeap
GetCurrentThread
WaitForSingleObjectEx
ReadConsoleW
GetStdHandle
IsProcessorFeaturePresent
ReadFile
GetACP
GetCurrentProcess
GetStringTypeW
SetFileAttributesW
InitializeCriticalSectionEx
CreateFileW
GlobalFree
IsValidCodePage
FindClose
GetTickCount
AreFileApisANSI
SetEndOfFile
FreeEnvironmentStringsW
FindNextFileW
GetCurrentDirectoryA
RemoveDirectoryA
GetCommandLineA
CreateSemaphoreA
GetEnvironmentVariableA
MultiByteToWideChar
EnumSystemLocalesW
user32
EmptyClipboard
SetFocus
LoadCursorA
GetDlgItem
DialogBoxParamA
EndDialog
GetFocus
GetWindowLongA
KillTimer
SetClipboardData
LoadStringW
GetWindowTextLengthA
GetKeyState
MonitorFromWindow
CharUpperA
EnableWindow
PostMessageA
SetWindowTextW
GetWindowTextW
GetWindowTextA
SetTimer
GetWindowTextLengthW
CharUpperW
SetWindowTextA
SetWindowLongA
MessageBoxW
wsprintfA
SetCursor
LoadIconA
ShowWindow
ScreenToClient
CloseClipboard
GetWindowRect
OpenClipboard
GetParent
CheckDlgButton
LoadStringA
SendMessageW
SystemParametersInfoA
MapDialogRect
GetMonitorInfoA
InvalidateRect
IsDlgButtonChecked
DialogBoxParamW
MessageBoxA
SendMessageA
MoveWindow
advapi32
CryptHashData
RegCreateKeyExW
CryptDestroyKey
CryptGetHashParam
CryptReleaseContext
RegOpenKeyExW
CryptDestroyHash
CryptEncrypt
CryptImportKey
RegCloseKey
CryptAcquireContextW
RegSetValueExW
CryptCreateHash
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetFileInfoA
CommandLineToArgvW
SHGetMalloc
SHGetSpecialFolderPathW
ole32
CoCreateInstance
CoInitialize
OleInitialize
CoUninitialize
oleaut32
VariantClear
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
bcrypt
BCryptGenRandom
crypt32
CertFreeCertificateChain
CertGetNameStringW
CertFindExtension
CryptQueryObject
CertCreateCertificateChainEngine
CryptDecodeObjectEx
CertFreeCertificateContext
CertFindCertificateInStore
PFXImportCertStore
CertOpenStore
CertGetCertificateChain
CertAddCertificateContextToStore
CryptStringToBinaryW
CertCloseStore
CertFreeCertificateChainEngine
CertEnumCertificatesInStore
wldap32
ord301
ord147
ord133
ord79
ord142
ord167
ord127
ord145
ord219
ord46
ord14
ord216
ord73
ord208
ord41
ord117
ord26
ord27
ws2_32
getpeername
sendto
recvfrom
WSAResetEvent
socket
ioctlsocket
gethostname
getsockopt
send
WSACloseEvent
WSACreateEvent
WSAIoctl
WSAEventSelect
WSAEnumNetworkEvents
getaddrinfo
closesocket
WSAGetLastError
ntohs
WSASetLastError
WSAStartup
WSACleanup
htons
setsockopt
WSAWaitForMultipleEvents
__WSAFDIsSet
select
accept
bind
connect
getsockname
htonl
listen
recv
freeaddrinfo
Sections
.text Size: 6.4MB - Virtual size: 6.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 230KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ