Static task
static1
Behavioral task
behavioral1
Sample
9c7e2e3f051409147e96999325cccfc4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c7e2e3f051409147e96999325cccfc4.exe
Resource
win10v2004-20231215-en
General
-
Target
9c7e2e3f051409147e96999325cccfc4
-
Size
284KB
-
MD5
9c7e2e3f051409147e96999325cccfc4
-
SHA1
23113683ea703bf79c69dc4f12d80909a83200ea
-
SHA256
e6c300dd54d6f1bef9849af3c9a9c596900f97005f83f85e8e138068f03a7e81
-
SHA512
3d3ce7417984f8b49fd5133883dc7e85fe4128956758ff66287b862a126ff04b1b64a1cb7526a7cd3a3560a37b02913cb3eb8aa7a20e00667bae83ff7302325c
-
SSDEEP
3072:YHbhq0/DxDRoVrGSjpqZPDI0EY5mU9YzBzxBaxfp3yvIEzw4ODfHwjnycQ:Y7h53RalU1bEM4kPwj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9c7e2e3f051409147e96999325cccfc4
Files
-
9c7e2e3f051409147e96999325cccfc4.exe windows:6 windows x64 arch:x64
5dfbfc13a5c10c08154762ccbde7bd5c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteValueW
RegEnumValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegSetValueExW
TraceMessage
RegQueryValueExW
kernel32
SetEvent
CloseHandle
GetVersion
QueryDosDeviceW
GetDriveTypeW
DebugBreak
DeviceIoControl
GetWindowsDirectoryW
CreateFileW
CreateThread
SetErrorMode
GetFileAttributesW
GetExitCodeThread
SetLastError
LeaveCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
CompareStringW
WideCharToMultiByte
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
lstrlenA
VirtualQuery
FindResourceW
FreeLibrary
LoadResource
LoadLibraryExW
WaitForSingleObject
GetModuleHandleW
InitializeCriticalSection
LoadLibraryW
SizeofResource
GetVersionExW
HeapDestroy
lstrcpynW
GetModuleFileNameW
MultiByteToWideChar
lstrlenW
GetLastError
GetProcAddress
VirtualAlloc
CreateEventW
GetSystemInfo
lstrcmpiW
lstrcatW
VirtualProtect
DeleteCriticalSection
user32
CharNextW
CharPrevW
msvcrt
??_V@YAXPEAX@Z
malloc
free
_wcmdln
_initterm
_amsg_exit
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
wcspbrk
_vsnwprintf
_purecall
iswspace
wcsncmp
towupper
_wtol
iswdigit
_wcsicmp
bsearch
_beginthreadex
_wtoi
memset
memcpy
??3@YAXPEAX@Z
realloc
??2@YAPEAX_K@Z
__wgetmainargs
__C_specific_handler
_XcptFilter
_exit
_cexit
exit
wcschr
towlower
memmove
??_U@YAPEAX_K@Z
_wcsnicmp
wcsrchr
wcsstr
memcmp
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
RtlVirtualUnwind
mpr
WNetGetConnectionW
WNetCancelConnection2W
WNetAddConnection2W
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoInitializeEx
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
CoUninitialize
PropVariantClear
oleaut32
VariantClear
SysAllocStringLen
SysStringLen
SysAllocString
VarUI4FromStr
SysFreeString
shell32
ShellExecuteExW
shlwapi
PathGetCharTypeW
ord158
mf
MFGetSupportedSchemes
Sections
.text Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xcqqnru Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE