Static task
static1
Behavioral task
behavioral1
Sample
d2b058e1569eda2bb13ac6b23c52bd8769b57c2a8be28f3afb8884e3b4766fd8.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
d2b058e1569eda2bb13ac6b23c52bd8769b57c2a8be28f3afb8884e3b4766fd8.exe
Resource
win10v2004-20231023-en
General
-
Target
d2b058e1569eda2bb13ac6b23c52bd8769b57c2a8be28f3afb8884e3b4766fd8
-
Size
4.9MB
-
MD5
fe4beb06bf0f57bfbfef68a546c05931
-
SHA1
7cc25ba150d40925f433d87ccf01d13c70d932c8
-
SHA256
d2b058e1569eda2bb13ac6b23c52bd8769b57c2a8be28f3afb8884e3b4766fd8
-
SHA512
46a7aaed5042e48d13daccc8a5f6eaaabf4248f4c9d041cdda125bc54e05954550898bf4d02a083ae9a76d281d3379359daf60792e6760dbf6dad560c3afd461
-
SSDEEP
49152:cIkGI+sjePXwjS1cY5QZuTtS0rQMYOQ+q8CEfjSn6riEjSt79KFeMv0YAaVo8oPO:cH1jefTfWsM0r1QnSOL70Fe17jmtT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d2b058e1569eda2bb13ac6b23c52bd8769b57c2a8be28f3afb8884e3b4766fd8
Files
-
d2b058e1569eda2bb13ac6b23c52bd8769b57c2a8be28f3afb8884e3b4766fd8.exe windows:4 windows x86 arch:x86
58dbeae88109fc17527fc4023fdb428b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
CreateMutexA
LocalFree
CreateFileA
OpenProcess
Sleep
OpenMutexA
CreateFileMappingA
SetUnhandledExceptionFilter
CloseHandle
GetWindowsDirectoryA
SetEvent
EnterCriticalSection
GetCurrentProcess
GetPrivateProfileStringA
QueryDosDeviceA
Process32NextW
GetLogicalDriveStringsA
Process32FirstW
CreateToolhelp32Snapshot
DuplicateHandle
SetFileAttributesA
OpenFileMappingA
GetFileSize
GetProcessTimes
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentDirectoryW
SetFilePointer
SystemTimeToFileTime
LocalFileTimeToFileTime
GetTickCount
CreateEventA
WaitForSingleObject
GetCurrentProcessId
InitializeCriticalSection
GetFileAttributesA
LeaveCriticalSection
OutputDebugStringA
UnmapViewOfFile
MapViewOfFile
GetLastError
OpenEventA
GetModuleFileNameA
WriteFile
WaitNamedPipeA
CreateDirectoryA
SetEndOfFile
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
GetStringTypeW
ReadFile
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
DeleteCriticalSection
ExitThread
GetCurrentThreadId
CreateThread
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetProcAddress
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
GetACP
GetOEMCP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
FlushFileBuffers
user32
wsprintfA
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
RegDeleteValueA
SetNamedSecurityInfoA
GetNamedSecurityInfoA
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
SetEntriesInAclA
BuildExplicitAccessWithNameA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHChangeNotify
ole32
CoCreateGuid
CoInitialize
psapi
GetProcessImageFileNameA
iphlpapi
GetAdaptersInfo
wininet
InternetReadFile
InternetQueryOptionA
InternetCloseHandle
InternetConnectA
InternetSetOptionA
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
HttpQueryInfoA
Sections
.text Size: 380KB - Virtual size: 379KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 582B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ