Static task
static1
Behavioral task
behavioral1
Sample
1517010c44c5818a6e9255344f0e2a23aace315704e6302b07b53dbb7168a234.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
1517010c44c5818a6e9255344f0e2a23aace315704e6302b07b53dbb7168a234.exe
Resource
win10v2004-20231023-en
General
-
Target
1517010c44c5818a6e9255344f0e2a23aace315704e6302b07b53dbb7168a234
-
Size
231KB
-
MD5
5ee3003cc48a853aef5f91df2bc881c7
-
SHA1
7f66c3daf44b5e0dadcf68d9cd6439aaf7da7e1a
-
SHA256
1517010c44c5818a6e9255344f0e2a23aace315704e6302b07b53dbb7168a234
-
SHA512
041b336562fead35d1013cf21835c68cb26cb5c7ba36c3ec1518d429de91d043705c4ec328005d98fde88ff118dcdb10a64a39b4bfdb45d05b926b9d913e2c65
-
SSDEEP
3072:CncQycYt2DvWfg2axLfae5DKE5y2kHldbySiuYa5Kp3nP6:WycYtUvWfg2atl1oYoKpXP6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1517010c44c5818a6e9255344f0e2a23aace315704e6302b07b53dbb7168a234
Files
-
1517010c44c5818a6e9255344f0e2a23aace315704e6302b07b53dbb7168a234.exe windows:5 windows x86
215added15c2c3ff2a218ec92c0375db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtInitializeRegistry
NtQueryInformationToken
NtRaiseHardError
NtSetDefaultLocale
NtShutdownSystem
RtlAdjustPrivilege
RtlAllocateHeap
RtlConvertSidToUnicodeString
RtlFreeHeap
RtlSetProcessIsCritical
RtlSetThreadIsCritical
RtlUnicodeStringToInteger
vDbgPrintExWithPrefix
advapi32
AddAccessAllowedAce
AddAce
AllocateAndInitializeSid
CloseServiceHandle
CopySid
CreateWellKnownSid
GetLengthSid
GetTokenInformation
ImpersonateLoggedOnUser
InitializeAcl
InitializeSecurityDescriptor
OpenSCManagerA
OpenServiceW
QueryServiceStatusEx
RegCloseKey
RegCreateKeyExW
RegEnumKeyExW
RegOpenCurrentUser
RegOpenKeyExW
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
RevertToSelf
SetEntriesInAclA
SetSecurityDescriptorDacl
kernel32
Beep
CloseHandle
CreateEventW
CreateProcessW
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetExitCodeProcess
GetExitCodeThread
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LocalAlloc
LocalFree
LocalReAlloc
OpenEventW
QueryPerformanceCounter
ResetEvent
SetEvent
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
mpr
WNetAddConnectionA
WNetClearConnections
WNetCloseEnum
WNetEnumResourceA
WNetOpenEnumA
msvcrt
__dllonexit
__getmainargs
__initenv
__lconv_init
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnprintf
abort
bsearch
calloc
exit
fprintf
free
fwrite
iswctype
malloc
memcmp
memmove
signal
sprintf
strchr
strcmp
strcpy
strcspn
strncmp
swprintf
vfprintf
wcschr
wcscmp
wcscpy
wcslen
wcsncpy
rpcrt4
NdrServerCall2
RpcServerListen
RpcServerRegisterIf
RpcServerUseProtseqEpW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
LoadUserProfileW
UnloadUserProfile
user32
CloseDesktop
CloseWindowStation
CreateDesktopW
CreateWindowExW
CreateWindowStationW
DefWindowProcA
DeleteMenu
DestroyWindow
DialogBoxIndirectParamW
DialogBoxParamA
DialogBoxParamW
DispatchMessageW
EndDialog
ExitWindowsEx
GetDesktopWindow
GetDlgItem
GetDlgItemTextW
GetLastInputInfo
GetMessageW
GetSystemMenu
GetUserObjectInformationW
GetWindowLongA
GetWindowLongW
GetWindowPlacement
KillTimer
LoadKeyboardLayoutW
LoadStringW
MessageBoxW
OpenInputDesktop
PostMessageA
PostMessageW
RegisterClassExW
RegisterHotKey
RegisterLogonProcess
SetDlgItemTextW
SetFocus
SetLogonNotifyWindow
SetProcessWindowStation
SetThreadDesktop
SetTimer
SetUserObjectSecurity
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowStationUser
SwitchDesktop
SystemParametersInfoW
TranslateMessage
UnregisterClassW
UnregisterHotKey
UpdatePerUserSystemParameters
wsprintfW
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 68KB - Virtual size: 68KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ