Static task
static1
Behavioral task
behavioral1
Sample
28208fadc282556644b1a4f618299750b29c512d2268891fea5b07de01bf279c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28208fadc282556644b1a4f618299750b29c512d2268891fea5b07de01bf279c.exe
Resource
win10v2004-20231215-en
General
-
Target
28208fadc282556644b1a4f618299750b29c512d2268891fea5b07de01bf279c
-
Size
3.0MB
-
MD5
20657fa2865baf174a6480b4e1ff8556
-
SHA1
0c3065ff1696c48ab1cf0631726a6bcd10c198e5
-
SHA256
28208fadc282556644b1a4f618299750b29c512d2268891fea5b07de01bf279c
-
SHA512
8941ac35531eefeae33be12f5f2379d3472dc8f7c7b2716cc4ad5d95edeac63cbbe5e6c5b08b08fa70ac45717f1156ba8b46d01050990fb94dd154bc10c128da
-
SSDEEP
49152:lIkGI+sjeGwjS1cu5QZuTtS0rQMYOQ+q8CEPjSn6rizjStm9KFeMs:lH1jeExWsM0r1Qn6OWm0Fe5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28208fadc282556644b1a4f618299750b29c512d2268891fea5b07de01bf279c
Files
-
28208fadc282556644b1a4f618299750b29c512d2268891fea5b07de01bf279c.exe windows:4 windows x86 arch:x86
58dbeae88109fc17527fc4023fdb428b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
CreateMutexA
LocalFree
CreateFileA
OpenProcess
Sleep
OpenMutexA
CreateFileMappingA
SetUnhandledExceptionFilter
CloseHandle
GetWindowsDirectoryA
SetEvent
EnterCriticalSection
GetCurrentProcess
GetPrivateProfileStringA
QueryDosDeviceA
Process32NextW
GetLogicalDriveStringsA
Process32FirstW
CreateToolhelp32Snapshot
DuplicateHandle
SetFileAttributesA
OpenFileMappingA
GetFileSize
GetProcessTimes
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentDirectoryW
SetFilePointer
SystemTimeToFileTime
LocalFileTimeToFileTime
GetTickCount
CreateEventA
WaitForSingleObject
GetCurrentProcessId
InitializeCriticalSection
GetFileAttributesA
LeaveCriticalSection
OutputDebugStringA
UnmapViewOfFile
MapViewOfFile
GetLastError
OpenEventA
GetModuleFileNameA
WriteFile
WaitNamedPipeA
CreateDirectoryA
SetEndOfFile
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
GetStringTypeW
ReadFile
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
DeleteCriticalSection
ExitThread
GetCurrentThreadId
CreateThread
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetProcAddress
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
GetACP
GetOEMCP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
FlushFileBuffers
user32
wsprintfA
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
RegDeleteValueA
SetNamedSecurityInfoA
GetNamedSecurityInfoA
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
SetEntriesInAclA
BuildExplicitAccessWithNameA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHChangeNotify
ole32
CoCreateGuid
CoInitialize
psapi
GetProcessImageFileNameA
iphlpapi
GetAdaptersInfo
wininet
InternetReadFile
InternetQueryOptionA
InternetCloseHandle
InternetConnectA
InternetSetOptionA
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
HttpQueryInfoA
Sections
.text Size: 380KB - Virtual size: 379KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ