Static task
static1
Behavioral task
behavioral1
Sample
1b0906fc54a2c7519d99f8c6b977b104.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b0906fc54a2c7519d99f8c6b977b104.exe
Resource
win10v2004-20231201-en
General
-
Target
1b0906fc54a2c7519d99f8c6b977b104
-
Size
350KB
-
MD5
1b0906fc54a2c7519d99f8c6b977b104
-
SHA1
e58543a1579876b4eeadf560f2206b1aeaa5029f
-
SHA256
7afca998e58a02ece13aed33a14fe844e15cca045f2c754f8af6add82ec11b40
-
SHA512
db9e8698a1926ad7f5ec79221bf2a645885beb13588c0d045f9a7a3ae82bf91c02023ff546a2b892bda5c071f282d5538f814f70da4fb0dec234ec37c675bb10
-
SSDEEP
6144:WgOonGEwL4fYTZxQkQDvcEOkCybEaQRXr9HNdvOa5:OwwaYTZxQkUOkx2LIa5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b0906fc54a2c7519d99f8c6b977b104
Files
-
1b0906fc54a2c7519d99f8c6b977b104.exe windows:5 windows x86 arch:x86
c0c1f823d1d1e8686fcd92e13da5e400
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
SetCurrentDirectoryW
ProcessIdToSessionId
GetCurrentProcessId
Sleep
CreateProcessW
TerminateProcess
LoadLibraryA
GetVersionExW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
WideCharToMultiByte
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
GetTickCount
InitializeCriticalSection
DeleteCriticalSection
VirtualQuery
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetCurrentThread
SetThreadPriority
SetPriorityClass
GetModuleFileNameW
ExitProcess
SetUnhandledExceptionFilter
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
IsValidCodePage
GetModuleHandleW
GetCurrentProcess
CloseHandle
OpenMutexW
GetLastError
LeaveCriticalSection
CreateMutexW
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
ReadFile
SetFilePointer
VirtualFreeEx
VirtualAllocEx
GetSystemInfo
GetModuleHandleA
WriteProcessMemory
VirtualFree
CreateRemoteThread
TerminateThread
VirtualAlloc
GetProcessId
WriteFile
SystemTimeToFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
GlobalAlloc
GlobalFree
QueryPerformanceCounter
CreateFileA
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
user32
FindWindowExW
FindWindowW
wsprintfW
GetWindowThreadProcessId
advapi32
AllocateAndInitializeSid
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
FreeSid
CheckTokenMembership
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateProcessAsUserW
shell32
ShellExecuteExW
ShellExecuteW
shlwapi
StrCmpIW
PathFileExistsW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
wininet
InternetOpenW
InternetConnectW
HttpOpenRequestW
InternetSetOptionA
InternetQueryOptionW
InternetSetOptionW
HttpSendRequestW
InternetReadFile
InternetCloseHandle
dnsapi
DnsFree
DnsQuery_W
iphlpapi
GetIpNetTable
GetAdaptersInfo
SendARP
ws2_32
htonl
inet_addr
ntohl
inet_ntoa
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ