Static task
static1
Behavioral task
behavioral1
Sample
232c7d26b6bf88fea5527320a118b5afffe1b664230558407074ab879c11c1aa.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
232c7d26b6bf88fea5527320a118b5afffe1b664230558407074ab879c11c1aa.exe
Resource
win10v2004-20231023-en
General
-
Target
232c7d26b6bf88fea5527320a118b5afffe1b664230558407074ab879c11c1aa
-
Size
268KB
-
MD5
7fa33645b48b1c3b091d9265fbf6edfa
-
SHA1
4a1e134c5cfc7531de5118e37a517956b6e13aad
-
SHA256
232c7d26b6bf88fea5527320a118b5afffe1b664230558407074ab879c11c1aa
-
SHA512
780f9639adb90eb88fcb7bda9530e6d3c142cd954fc51289afb4cb9afef1b7f181bd229802a7b248d2bafca656f28c9610541762909007f85db4433685a2cafb
-
SSDEEP
6144:7fvOEGvofUwM8Vl+knqsL6SRbE9/E/lY/lq7H//V85U:7fmESwnLLMU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 232c7d26b6bf88fea5527320a118b5afffe1b664230558407074ab879c11c1aa
Files
-
232c7d26b6bf88fea5527320a118b5afffe1b664230558407074ab879c11c1aa.exe windows:5 windows x86
dde3ba2c54e63262dee837a27a2c5cf7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtInitializeRegistry
NtRaiseHardError
NtSetDefaultLocale
NtShutdownSystem
RtlAdjustPrivilege
RtlAllocateHeap
RtlFreeHeap
RtlSetProcessIsCritical
RtlSetThreadIsCritical
RtlUnicodeStringToInteger
vDbgPrintExWithPrefix
advapi32
AddAccessAllowedAceEx
AllocateAndInitializeSid
CloseServiceHandle
CreateProcessAsUserW
FreeSid
GetLengthSid
GetTokenInformation
ImpersonateLoggedOnUser
InitializeAcl
InitializeSecurityDescriptor
MakeSelfRelativeSD
OpenSCManagerA
OpenServiceW
QueryServiceStatusEx
RegCloseKey
RegCreateKeyExW
RegEnumKeyExW
RegOpenCurrentUser
RegOpenKeyExW
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
RevertToSelf
SetEntriesInAclA
SetSecurityDescriptorDacl
kernel32
Beep
CloseHandle
CreateEventW
CreateProcessW
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetExitCodeProcess
GetExitCodeThread
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LocalAlloc
LocalFree
LocalReAlloc
OpenEventW
QueryPerformanceCounter
ResetEvent
RtlUnwind
SetEvent
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
mpr
WNetAddConnectionA
WNetClearConnections
WNetCloseEnum
WNetEnumResourceA
WNetOpenEnumA
msvcrt
__dllonexit
__getmainargs
__initenv
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnprintf
abort
bsearch
calloc
exit
free
fwrite
iswctype
malloc
memcmp
memmove
signal
sprintf
strchr
strcmp
strcpy
strcspn
strncmp
swprintf
vfprintf
wcschr
wcscmp
wcscpy
wcslen
wcsncpy
rpcrt4
NdrServerCall2
RpcServerListen
RpcServerRegisterIf
RpcServerUseProtseqEpW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
LoadUserProfileW
UnloadUserProfile
user32
CloseDesktop
CloseWindowStation
CreateDesktopW
CreateWindowExW
CreateWindowStationW
DefWindowProcA
DeleteMenu
DestroyWindow
DialogBoxIndirectParamW
DialogBoxParamA
DialogBoxParamW
DispatchMessageW
EndDialog
ExitWindowsEx
GetDesktopWindow
GetDlgItem
GetDlgItemTextW
GetLastInputInfo
GetMessageW
GetSystemMenu
GetUserObjectInformationW
GetWindowLongA
GetWindowLongW
GetWindowPlacement
KillTimer
LoadKeyboardLayoutW
LoadStringW
MessageBoxW
OpenInputDesktop
PostMessageA
PostMessageW
RegisterClassExW
RegisterHotKey
RegisterLogonProcess
SetDlgItemTextW
SetFocus
SetLogonNotifyWindow
SetProcessWindowStation
SetThreadDesktop
SetTimer
SetUserObjectSecurity
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowStationUser
SwitchDesktop
SystemParametersInfoW
TranslateMessage
UnregisterClassW
UnregisterHotKey
UpdatePerUserSystemParameters
wsprintfW
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 86KB - Virtual size: 85KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ