Static task
static1
Behavioral task
behavioral1
Sample
d58c443b9d0484f504762cda3a604b0549c810a23b74bd552c6cc82f754c467a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d58c443b9d0484f504762cda3a604b0549c810a23b74bd552c6cc82f754c467a.exe
Resource
win10v2004-20231023-en
General
-
Target
d58c443b9d0484f504762cda3a604b0549c810a23b74bd552c6cc82f754c467a
-
Size
394KB
-
MD5
329b14aeec5de9d46294498c2d629b98
-
SHA1
0691c8c07a0af797c11fb0379482d279840e2602
-
SHA256
d58c443b9d0484f504762cda3a604b0549c810a23b74bd552c6cc82f754c467a
-
SHA512
217895cc0f00a7515483c27f5ab7de85a0b05bf63befc16e3455c9b19a2acd74e78e26389e235eb5d566d40ba5945a06b473241b957f20b99c3d3bacb399727e
-
SSDEEP
6144:ZE16JRGuUM+ATm0WrRL1TyVwNLsEcMoyFYcEOkCybEaQRXr9HNdvOahEG:ZEWJDWrRxTyVw2EcMOOkx2LIahEG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d58c443b9d0484f504762cda3a604b0549c810a23b74bd552c6cc82f754c467a
Files
-
d58c443b9d0484f504762cda3a604b0549c810a23b74bd552c6cc82f754c467a.exe windows:5 windows x86
945d4f7f8493c12493fdd62fb1fd6632
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
VirtualQuery
LoadLibraryW
GetSystemDirectoryW
SetCurrentDirectoryW
ProcessIdToSessionId
CreateProcessW
TerminateProcess
LoadLibraryA
GetVersionExW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
QueryPerformanceCounter
WinExec
GetFileSizeEx
ReadFile
OpenFileMappingW
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
SetHandleCount
WriteConsoleW
WideCharToMultiByte
CreateThread
GetCurrentThread
SetThreadPriority
SetPriorityClass
GetModuleFileNameW
Sleep
ExitProcess
SetUnhandledExceptionFilter
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetProcAddress
GetCurrentProcessId
OpenProcess
MultiByteToWideChar
WriteFile
GetTickCount
GetCurrentThreadId
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
RtlUnwind
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
LCMapStringA
IsDebuggerPresent
UnhandledExceptionFilter
LCMapStringW
IsValidCodePage
GetOEMCP
GetStartupInfoW
GetACP
GetCPInfo
GetSystemTimeAsFileTime
HeapCreate
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
CreateFileW
GetModuleHandleW
GetCurrentProcess
OpenMutexW
GetLastError
CloseHandle
CreateMutexW
SetFilePointer
GetSystemInfo
GetModuleHandleA
VirtualFree
TerminateThread
VirtualAlloc
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetProcessId
SystemTimeToFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
GlobalAlloc
GlobalFree
CreateFileA
GetFileType
user32
GetThreadDesktop
GetWindowThreadProcessId
FindWindowExW
FindWindowW
wsprintfW
OpenDesktopW
SetThreadDesktop
advapi32
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
OpenSCManagerW
StartServiceW
CreateServiceW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
CreateProcessAsUserW
CloseServiceHandle
shell32
ShellExecuteExW
ShellExecuteW
shlwapi
StrCmpIW
PathFileExistsW
wininet
InternetOpenW
InternetSetOptionW
InternetOpenUrlW
HttpSendRequestW
InternetQueryOptionW
InternetSetOptionA
HttpOpenRequestW
InternetConnectW
InternetCloseHandle
InternetReadFile
psapi
GetModuleFileNameExW
ws2_32
WSAStartup
socket
setsockopt
inet_addr
sendto
recvfrom
ntohs
closesocket
inet_ntoa
htonl
ntohl
htons
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
dnsapi
DnsFree
DnsQuery_W
iphlpapi
SendARP
GetIpNetTable
GetAdaptersInfo
Sections
.text Size: 162KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ