Static task
static1
Behavioral task
behavioral1
Sample
a08bc8b6006c05c4b8e2db3d443d24dda60f3ea0d5c0344dc83681af884dfaa3.exe
Resource
win7-20231023-en
General
-
Target
a08bc8b6006c05c4b8e2db3d443d24dda60f3ea0d5c0344dc83681af884dfaa3
-
Size
1.4MB
-
MD5
88694eb908cfff229f5ea2aaf73bf748
-
SHA1
d016f313dff0d1513151f3d63047e72f88a3b101
-
SHA256
a08bc8b6006c05c4b8e2db3d443d24dda60f3ea0d5c0344dc83681af884dfaa3
-
SHA512
2ff99e1920d845938b01fc7f20e271a2678c266932452363be5421b1eec8b582bfc51a6142b41302e80c3c8207cfec7718168ba0dd2e168f2b9406bd4cd1d1ef
-
SSDEEP
24576:dK5tmSH1BN4j7UP3QFnnLjzWDwCmTPPk/z5Zf5hz0dNUX:dOmSZKUMyDwCmTPc/lZfuN4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a08bc8b6006c05c4b8e2db3d443d24dda60f3ea0d5c0344dc83681af884dfaa3
Files
-
a08bc8b6006c05c4b8e2db3d443d24dda60f3ea0d5c0344dc83681af884dfaa3.exe windows:5 windows x64 arch:x64
fbb9063fc103c68632a51eafe55dbaf2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
kernel32
LoadLibraryA
FormatMessageA
QueryPerformanceFrequency
GetTempPathW
DuplicateHandle
CreateProcessA
ReadConsoleW
Sleep
WriteFile
FlushFileBuffers
SetFilePointer
CloseHandle
GetDriveTypeW
CreateDirectoryW
CreateFileW
GetProcAddress
GetLongPathNameW
OpenProcess
GetLastError
LoadResource
GetFileSize
ReadFile
FindClose
GetSystemInfo
lstrlenW
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
FindResourceExW
GetCurrentDirectoryW
RemoveDirectoryW
QueryDosDeviceW
SetFileAttributesW
GetFileAttributesW
FindFirstFileW
FindNextFileW
GetVersionExW
WideCharToMultiByte
GetUserDefaultLangID
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Module32FirstW
Module32NextW
GetCurrentThreadId
CreateThread
ReleaseMutex
WaitForSingleObject
CreateMutexW
CreateProcessW
CopyFileW
GetExitCodeProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
GetFileAttributesExW
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
LocalFree
RtlPcToFileHeader
RaiseException
RtlUnwindEx
FreeLibrary
LoadLibraryExW
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetACP
HeapAlloc
HeapReAlloc
HeapFree
GetFileType
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
GetProcessHeap
HeapSize
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
MoveFileExW
CreatePipe
DeleteFileW
GetSystemDirectoryW
GetEnvironmentVariableW
DeleteCriticalSection
MultiByteToWideChar
SetEndOfFile
shell32
SHCreateDirectoryExW
SHGetFolderPathW
ShellExecuteW
ord165
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
oleaut32
VariantClear
SysFreeString
SysAllocString
shlwapi
PathRemoveFileSpecW
msi
ord113
user32
GetDC
GetDlgItem
SetWindowPlacement
DestroyWindow
SetWindowTextW
GetSystemMetrics
MessageBoxW
IsWindow
SetWindowsHookExW
PostMessageW
DispatchMessageW
IsDialogMessageW
SetDlgItemTextW
CreateDialogParamW
SendMessageW
ShowWindow
TranslateMessage
GetMessageW
LoadIconW
CallNextHookEx
UnhookWindowsHookEx
GetWindowPlacement
gdi32
GetTextExtentPoint32W
advapi32
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueExW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
Sections
.text Size: 454KB - Virtual size: 454KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE