Static task
static1
Behavioral task
behavioral1
Sample
d325215e0dcf83ff3f53816fe783a926.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d325215e0dcf83ff3f53816fe783a926.exe
Resource
win10v2004-20231215-en
General
-
Target
d325215e0dcf83ff3f53816fe783a926
-
Size
286KB
-
MD5
d325215e0dcf83ff3f53816fe783a926
-
SHA1
4b1f2e04e61bf83612f7c5fd21c3aaa1b486416f
-
SHA256
0bb741b078ba437cec3370ce530ac9eae90de808f1fb224707dbf228e5900061
-
SHA512
aae45aa838546700fc5cebf1d8f34a1eee79b0548d5295e2ef7c305d3fc058d7058bcf6194704a904e2b353e84972b8d84e016771eca4e254005d8e0199a87ff
-
SSDEEP
6144:orJ04Jb7OAvd7k/oxQWMsCGFwjOgpHZGmAOvyFAasfEI:o+Wb7t17k/GQWMsCcngBZGmhaQEI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d325215e0dcf83ff3f53816fe783a926
Files
-
d325215e0dcf83ff3f53816fe783a926.exe windows:6 windows x86 arch:x86
0851697eb18d5ba01115847ac73fe4b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
GetLastError
MultiByteToWideChar
WideCharToMultiByte
SetFilePointer
CreateFileW
LocalFileTimeToFileTime
GetCurrentDirectoryW
SystemTimeToFileTime
OutputDebugStringW
SetEndOfFile
CreateMutexA
ReleaseMutex
Sleep
DeleteFileA
DeleteFileW
CreateThread
GetLogicalDrives
DecodePointer
GetModuleFileNameA
ReadFile
ExpandEnvironmentStringsA
CloseHandle
CreateFileA
WriteConsoleW
HeapSize
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
GetProcessHeap
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
HeapReAlloc
GetConsoleMode
GetStringTypeW
LCMapStringW
CompareStringW
GetDriveTypeA
GetFileSizeEx
WriteFile
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
Process32First
Process32Next
GetComputerNameA
GlobalAlloc
GlobalFree
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcmpiA
GetProcessTimes
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
EncodePointer
RaiseException
SetLastError
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
GetFileType
GetTempPathA
advapi32
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
shell32
SHCreateDirectoryExW
ws2_32
inet_ntoa
WSACleanup
inet_addr
WSAStartup
gethostbyname
winhttp
WinHttpQueryDataAvailable
WinHttpAddRequestHeaders
WinHttpReceiveResponse
WinHttpOpen
WinHttpQueryHeaders
WinHttpReadData
WinHttpConnect
WinHttpSetOption
WinHttpCloseHandle
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpOpenRequest
dbghelp
MakeSureDirectoryPathExists
shlwapi
PathFileExistsA
PathRemoveExtensionA
rpcrt4
UuidCreateSequential
iphlpapi
GetAdaptersInfo
SendARP
Sections
.text Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ