Static task
static1
Behavioral task
behavioral1
Sample
253ec0ddffee290e87503308dabc2f9b5b613e992124f0c2f668fb95a3b58405.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
253ec0ddffee290e87503308dabc2f9b5b613e992124f0c2f668fb95a3b58405.exe
Resource
win10v2004-20231023-en
General
-
Target
253ec0ddffee290e87503308dabc2f9b5b613e992124f0c2f668fb95a3b58405
-
Size
1.9MB
-
MD5
0d9acc5a21c246209fa64fa9ca5de9a4
-
SHA1
3af66bb4ff404a807739acc7f19b04c0c94802c8
-
SHA256
253ec0ddffee290e87503308dabc2f9b5b613e992124f0c2f668fb95a3b58405
-
SHA512
3110d0960423e661b7e41b9c29076d073a419fb2b8a7a7134454100acce5a7347d2ae48c020ccca2b5dc0a7834a9b626a150870882db595e08e6c5fce748a836
-
SSDEEP
49152:nB/3Yr84P+ztOdtjuIBDEogSKFR2pOuLp:tz3Sy4pOu1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 253ec0ddffee290e87503308dabc2f9b5b613e992124f0c2f668fb95a3b58405
Files
-
253ec0ddffee290e87503308dabc2f9b5b613e992124f0c2f668fb95a3b58405.exe windows:6 windows x64
e9c8d8de367079edde19d7abdbe071ed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
closesocket
htons
inet_pton
WSAStartup
send
socket
connect
recv
WSACleanup
crypt32
CryptUnprotectData
wininet
InternetOpenA
InternetQueryDataAvailable
InternetReadFile
InternetOpenUrlA
InternetOpenW
InternetCloseHandle
HttpQueryInfoW
ntdll
NtQueryObject
NtQuerySystemInformation
rstrtmgr
RmRegisterResources
RmGetList
RmStartSession
RmEndSession
kernel32
MultiByteToWideChar
LocalFree
WideCharToMultiByte
GetExitCodeProcess
WriteProcessMemory
TerminateProcess
GetModuleFileNameW
WaitForSingleObject
ResumeThread
CloseHandle
GetThreadContext
VirtualAllocEx
CreateProcessW
SetThreadContext
VirtualFree
VirtualAlloc
ExitProcess
ReadFile
GetModuleFileNameA
GetVolumeInformationW
GetGeoInfoA
HeapFree
EnterCriticalSection
GetCurrentProcess
GetProcessId
GetProductInfo
LeaveCriticalSection
SetFilePointer
InitializeCriticalSectionEx
GetModuleHandleA
OpenProcess
HeapSize
GetLogicalDriveStringsW
GetFinalPathNameByHandleA
GetTimeZoneInformation
GetLastError
HeapReAlloc
GetNativeSystemInfo
HeapAlloc
GetUserGeoID
DecodePointer
GetProcAddress
GetFileSize
DeleteCriticalSection
GetComputerNameW
GetProcessHeap
GlobalMemoryStatusEx
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
IsProcessorFeaturePresent
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeLibrary
GetModuleHandleExW
VirtualProtect
VirtualQuery
GetCurrentThreadId
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
GetStartupInfoW
RaiseException
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
SetStdHandle
CreateFileW
WriteConsoleW
OutputDebugStringW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEndOfFile
ResetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
InitializeSListHead
RtlUnwindEx
RtlUnwind
RtlPcToFileHeader
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
VirtualQueryEx
ReadProcessMemory
LoadLibraryA
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
InitializeCriticalSection
LCMapStringEx
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
InitializeSRWLock
GetCommandLineA
GetCommandLineW
GetSystemInfo
SetEvent
GetFileInformationByHandleEx
AreFileApisANSI
GetFileAttributesExW
FindNextFileW
FindFirstFileExW
FormatMessageA
GetLocaleInfoEx
GetCurrentDirectoryW
FindClose
FindFirstFileW
user32
ReleaseDC
GetSystemMetrics
GetDesktopWindow
GetDC
GetWindowRect
EnumDisplayDevicesW
gdi32
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetDeviceCaps
DeleteDC
GetObjectW
DeleteObject
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetUserNameW
RegEnumKeyExA
GetCurrentHwProfileW
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
CreateStreamOnHGlobal
shlwapi
ord214
ord184
ord213
gdiplus
GdiplusStartup
GdiplusShutdown
GdipGetImageEncoders
GdipCloneImage
GdipAlloc
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipCreateBitmapFromScan0
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 603KB - Virtual size: 602KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ