Static task
static1
Behavioral task
behavioral1
Sample
22a283332e204482f2c1876360fdf6b6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22a283332e204482f2c1876360fdf6b6.exe
Resource
win10v2004-20231215-en
General
-
Target
22a283332e204482f2c1876360fdf6b6
-
Size
350KB
-
MD5
22a283332e204482f2c1876360fdf6b6
-
SHA1
b483c4910994f582a57f42624d803969f47b8770
-
SHA256
3da062a8c62f7de4da0e911b13e18d1f0704653505194269fae543d431c2923f
-
SHA512
2ab3c77e76858b25c3f0a5fc11a43062c7f3da9228b056f4981cf72a2ea62004ac06ae7fa51c9ae60e5daf8b7de1f89f934a79ab8b42877310fdf32f5d0220a9
-
SSDEEP
6144:XgOonGEwL4fYTZxQkQDfcEOkCybEaQRXr9HNdvOag:9wwaYTZxQkUOkx2LIag
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22a283332e204482f2c1876360fdf6b6
Files
-
22a283332e204482f2c1876360fdf6b6.exe windows:5 windows x86 arch:x86
c0c1f823d1d1e8686fcd92e13da5e400
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
SetCurrentDirectoryW
ProcessIdToSessionId
GetCurrentProcessId
Sleep
CreateProcessW
TerminateProcess
LoadLibraryA
GetVersionExW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
WideCharToMultiByte
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
GetTickCount
InitializeCriticalSection
DeleteCriticalSection
VirtualQuery
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetCurrentThread
SetThreadPriority
SetPriorityClass
GetModuleFileNameW
ExitProcess
SetUnhandledExceptionFilter
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
IsValidCodePage
GetModuleHandleW
GetCurrentProcess
CloseHandle
OpenMutexW
GetLastError
LeaveCriticalSection
CreateMutexW
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
ReadFile
SetFilePointer
VirtualFreeEx
VirtualAllocEx
GetSystemInfo
GetModuleHandleA
WriteProcessMemory
VirtualFree
CreateRemoteThread
TerminateThread
VirtualAlloc
GetProcessId
WriteFile
SystemTimeToFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
GlobalAlloc
GlobalFree
QueryPerformanceCounter
CreateFileA
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
user32
FindWindowExW
FindWindowW
wsprintfW
GetWindowThreadProcessId
advapi32
AllocateAndInitializeSid
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
FreeSid
CheckTokenMembership
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateProcessAsUserW
shell32
ShellExecuteExW
ShellExecuteW
shlwapi
StrCmpIW
PathFileExistsW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
wininet
InternetOpenW
InternetConnectW
HttpOpenRequestW
InternetSetOptionA
InternetQueryOptionW
InternetSetOptionW
HttpSendRequestW
InternetReadFile
InternetCloseHandle
dnsapi
DnsFree
DnsQuery_W
iphlpapi
GetIpNetTable
GetAdaptersInfo
SendARP
ws2_32
htonl
inet_addr
ntohl
inet_ntoa
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ