Static task
static1
Behavioral task
behavioral1
Sample
431b7b6add0b2fd6bb4253841cda7107.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
431b7b6add0b2fd6bb4253841cda7107.exe
Resource
win10v2004-20231201-en
General
-
Target
431b7b6add0b2fd6bb4253841cda7107
-
Size
350KB
-
MD5
431b7b6add0b2fd6bb4253841cda7107
-
SHA1
9a8f9ec5e4596a9ce890e1c7643aaded09a5c6f7
-
SHA256
d0c91be5590b369cae7f2ebc1f9c7747c1cdf27b40088b5d99eba77e2d834591
-
SHA512
4d22042df43823724e58c7502f9912afe4298fc4f4f00e25935ad8ba9fec352edb22bf6f0052381cf7864c68c984b3d55ea3d5b6ab097a61920637b82e5b3357
-
SSDEEP
6144:YsylviILzrS3XeQkD8McEOkCybEaQRXr9HNdvOaZ:Q8I3rSeQkNOkx2LIaZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 431b7b6add0b2fd6bb4253841cda7107
Files
-
431b7b6add0b2fd6bb4253841cda7107.exe windows:5 windows x86 arch:x86
c0c1f823d1d1e8686fcd92e13da5e400
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
SetCurrentDirectoryW
ProcessIdToSessionId
GetCurrentProcessId
Sleep
CreateProcessW
TerminateProcess
LoadLibraryA
GetVersionExW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
WideCharToMultiByte
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
GetTickCount
InitializeCriticalSection
DeleteCriticalSection
VirtualQuery
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetCurrentThread
SetThreadPriority
SetPriorityClass
GetModuleFileNameW
ExitProcess
SetUnhandledExceptionFilter
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
IsValidCodePage
GetModuleHandleW
GetCurrentProcess
CloseHandle
OpenMutexW
GetLastError
LeaveCriticalSection
CreateMutexW
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
ReadFile
SetFilePointer
VirtualFreeEx
VirtualAllocEx
GetSystemInfo
GetModuleHandleA
WriteProcessMemory
VirtualFree
CreateRemoteThread
TerminateThread
VirtualAlloc
GetProcessId
WriteFile
SystemTimeToFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
GlobalAlloc
GlobalFree
QueryPerformanceCounter
CreateFileA
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
user32
FindWindowExW
FindWindowW
wsprintfW
GetWindowThreadProcessId
advapi32
AllocateAndInitializeSid
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
FreeSid
CheckTokenMembership
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateProcessAsUserW
shell32
ShellExecuteExW
ShellExecuteW
shlwapi
StrCmpIW
PathFileExistsW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
wininet
InternetOpenW
InternetConnectW
HttpOpenRequestW
InternetSetOptionA
InternetQueryOptionW
InternetSetOptionW
HttpSendRequestW
InternetReadFile
InternetCloseHandle
dnsapi
DnsFree
DnsQuery_W
iphlpapi
GetIpNetTable
GetAdaptersInfo
SendARP
ws2_32
htonl
inet_addr
ntohl
inet_ntoa
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ