Static task
static1
Behavioral task
behavioral1
Sample
865ad38275d04c38cb85f30fa7ece09130d3ca6dba670fe6c33fb870e085605f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
865ad38275d04c38cb85f30fa7ece09130d3ca6dba670fe6c33fb870e085605f.exe
Resource
win10v2004-20231222-en
General
-
Target
865ad38275d04c38cb85f30fa7ece09130d3ca6dba670fe6c33fb870e085605f
-
Size
1.2MB
-
MD5
3f6d829589a4d8ec144e33871abdd5a6
-
SHA1
b50e43c30591539810427fca8c32e38f76ab6183
-
SHA256
865ad38275d04c38cb85f30fa7ece09130d3ca6dba670fe6c33fb870e085605f
-
SHA512
05e8f6f85949c98d9368511b208bdc11c48e1fcfba760eae48fe155cacd3b671051c55b020e05027a9111ab5c5e47f7d8fbb441cd76fae9530cc42878dd1fb9b
-
SSDEEP
24576:uoKNYKmgUSMCOJZh05AgBcgYL9mNyweW2fsAt4hwu/UEl9bu0PHTuCH:4Nq77gBcENQfZt4h5p9bZTF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 865ad38275d04c38cb85f30fa7ece09130d3ca6dba670fe6c33fb870e085605f
Files
-
865ad38275d04c38cb85f30fa7ece09130d3ca6dba670fe6c33fb870e085605f.exe windows:5 windows x86 arch:x86
cd88f298feb287e83e03a7aaee1d092c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryW
LoadLibraryW
OutputDebugStringW
SetDllDirectoryW
GetModuleFileNameW
GetCommandLineW
OutputDebugStringA
CreateProcessW
CreateToolhelp32Snapshot
GetLastError
lstrlenW
lstrlenA
CreateFileW
WriteConsoleW
CompareStringW
GetConsoleMode
GetConsoleCP
GetExitCodeProcess
GetTimeZoneInformation
GetCurrentDirectoryW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
FatalAppExitA
HeapReAlloc
GetCurrentProcessId
Process32FirstW
Process32NextW
Sleep
GetTickCount
OpenProcess
WaitForSingleObject
CloseHandle
InterlockedExchange
IsValidCodePage
GetOEMCP
GetACP
QueryPerformanceCounter
HeapDestroy
HeapCreate
GetStartupInfoW
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
HeapSize
GetLocaleInfoW
GetStdHandle
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetLastError
TlsFree
TlsSetValue
TlsGetValue
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesW
InterlockedDecrement
GetDiskFreeSpaceExA
GetDriveTypeW
FindFirstFileW
LocalFree
LocalAlloc
lstrcpyW
GetDriveTypeA
GetLogicalDriveStringsA
DeleteFileA
SetFileAttributesA
GetFileAttributesA
GetModuleFileNameA
GetModuleHandleA
CreateFileA
GetLongPathNameW
HeapAlloc
GetProcessHeap
VirtualQuery
WriteProcessMemory
GetCurrentProcess
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
HeapFree
Thread32Next
Thread32First
SuspendThread
OpenThread
GetCurrentThreadId
TerminateProcess
WaitForMultipleObjects
SearchPathW
DuplicateHandle
CreateEventA
EnterCriticalSection
ReadProcessMemory
VirtualAllocEx
InitializeCriticalSection
SetErrorMode
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetPrivateProfileStringA
LoadLibraryA
GetPrivateProfileStringW
FreeLibrary
InterlockedIncrement
InterlockedCompareExchange
DeleteCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
FormatMessageA
GetEnvironmentVariableA
CreateFileMappingA
OpenFileMappingA
CreateThread
ExitThread
GetCurrentThread
GetExitCodeThread
SleepEx
GetSystemTimeAsFileTime
VirtualProtect
VirtualLock
VirtualUnlock
SetProcessWorkingSetSize
FlushViewOfFile
SetEndOfFile
SetFilePointer
Process32Next
Process32First
GetSystemInfo
GetVersionExA
GetLocalTime
Module32First
LockFile
LockFileEx
UnlockFile
UnlockFileEx
WriteFile
ReadFile
FlushFileBuffers
GetFileSize
CreateDirectoryA
CopyFileA
GetShortPathNameA
CreateMutexA
ReleaseMutex
ResetEvent
SetEvent
ExitProcess
GenerateConsoleCtrlEvent
RtlUnwind
RaiseException
GetCommandLineA
HeapSetInformation
LCMapStringW
GetCPInfo
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExA
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
CreatePipe
CreateProcessA
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetFullPathNameA
SetConsoleCtrlHandler
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFileInformationByHandle
PeekNamedPipe
GetTimeFormatA
GetDateFormatA
MoveFileA
TlsAlloc
OpenMutexA
user32
InflateRect
OffsetRect
SetWindowLongA
MessageBoxA
TranslateMessage
PeekMessageW
GetWindow
GetForegroundWindow
SetWindowPos
DispatchMessageA
SetCursor
ClipCursor
shell32
CommandLineToArgvW
SHCreateDirectoryExW
SHGetDesktopFolder
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteW
version
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoSizeW
shlwapi
PathFileExistsW
PathIsRelativeW
winmm
timeBeginPeriod
timeGetDevCaps
timeSetEvent
timeKillEvent
tx_log
?GetLogLevel@TxLogWrapper@@YG?AW4LogLevel@1@XZ
?MakeLogOutput@TxLogWrapper@@YGXPB_W0W4LogLevel@1@@Z
?SetLogPath@TxLogWrapper@@YGXPB_W@Z
?SetLogLevel@TxLogWrapper@@YGXW4LogLevel@1@@Z
?FlushLog@TxLogWrapper@@YGXXZ
crypt32
CryptMsgClose
CertCloseStore
CertFreeCertificateContext
CertGetNameStringA
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CertGetNameStringW
ws2_32
listen
socket
setsockopt
ioctlsocket
gethostbyname
htons
ntohl
inet_addr
bind
WSAGetLastError
connect
__WSAFDIsSet
select
accept
closesocket
send
recv
htonl
WSACleanup
getsockopt
inet_ntoa
WSAStartup
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoTaskMemFree
CoInitializeSecurity
oleaut32
SysFreeString
VariantClear
CreateErrorInfo
SetErrorInfo
VariantInit
VariantChangeType
GetErrorInfo
SysAllocString
comdlg32
GetOpenFileNameW
advapi32
RegCreateKeyExW
AllocateAndInitializeSid
InitializeSecurityDescriptor
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
GetLengthSid
Sections
.text Size: 804KB - Virtual size: 804KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 45KB - Virtual size: 5.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 255KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE