Static task
static1
Behavioral task
behavioral1
Sample
1fe2d3cb45f014da67e49ff344d815ea.exe
Resource
win7-20231129-en
General
-
Target
1fe2d3cb45f014da67e49ff344d815ea
-
Size
3.0MB
-
MD5
1fe2d3cb45f014da67e49ff344d815ea
-
SHA1
825662121f154fca74559ef1898bd552ff77e3d2
-
SHA256
126f6d027eabd4096618c312441f83d2054093fcf830f7a1b893bdf9c1d7fabb
-
SHA512
fedb9d165876025589ba33df81ab7e5f901ca54b56efa7857ee0030bf01efedc0f14478b65f86ce3fe2fe075387b63f21e32ea4fb36a234468087fa01b9350b7
-
SSDEEP
49152:MS9TCdKa5GLnVNRE/j/xMkF1Kmc3cJL8vM4Ow+D/aX9z8bx6H:MSJ9a5qNExMkb9OcCUVnDaa1a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1fe2d3cb45f014da67e49ff344d815ea
Files
-
1fe2d3cb45f014da67e49ff344d815ea.exe windows:5 windows x86 arch:x86
682e57ead2f98c3c3f3ca6597d1b28b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidToStringW
RpcStringFreeW
imagehlp
ImageEnumerateCertificates
ImageGetCertificateData
shlwapi
SHDeleteKeyW
SHGetValueW
SHEnumValueW
SHDeleteValueW
StrStrIW
PathFindFileNameW
SHSetValueW
kernel32
CloseHandle
FindFirstFileW
MoveFileExW
CreateDirectoryW
GetModuleFileNameW
GetTempPathW
FindClose
RemoveDirectoryW
FindNextFileW
LocalFree
CopyFileW
Sleep
TlsGetValue
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
GetProcAddress
CreateIoCompletionPort
GetModuleHandleA
CancelIo
DeleteCriticalSection
GetCurrentThreadId
SetWaitableTimer
GetQueuedCompletionStatus
WaitForSingleObject
InitializeCriticalSection
TlsSetValue
TerminateThread
GetVersionExW
SetLastError
QueueUserAPC
LoadLibraryA
WaitForMultipleObjects
FreeResource
FindResourceW
LoadResource
LoadLibraryW
SizeofResource
LockResource
MultiByteToWideChar
OutputDebugStringW
GetTickCount
GetSystemDirectoryW
GetVersion
ExitProcess
CreateMutexW
FreeLibrary
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
CreateFileW
VirtualAlloc
VirtualProtect
CreateProcessW
TlsAlloc
GetCurrentThread
OpenProcess
TerminateProcess
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetCurrentProcessId
ReleaseSemaphore
FreeLibraryAndExitThread
GetThreadTimes
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
SetStdHandle
ReadConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
HeapSize
GetOEMCP
GetACP
IsValidCodePage
AreFileApisANSI
GetModuleHandleExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
TlsFree
PostQueuedCompletionStatus
InterlockedExchangeAdd
EnterCriticalSection
GetLastError
InterlockedExchange
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
WriteConsoleW
SetEnvironmentVariableA
GetFullPathNameW
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
GetCurrentDirectoryW
SetEndOfFile
GetCurrentProcess
VerSetConditionMask
SleepEx
VerifyVersionInfoA
FormatMessageA
CreateSemaphoreW
GetModuleHandleW
GetStartupInfoW
CreateEventW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
FileTimeToSystemTime
GetFileInformationByHandle
FileTimeToLocalFileTime
SetFilePointerEx
LoadLibraryExW
ExitThread
CreateThread
GetCommandLineA
GetCPInfo
HeapReAlloc
DeleteFileW
IsProcessorFeaturePresent
IsDebuggerPresent
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
GetExitCodeThread
DuplicateHandle
GetStringTypeW
WideCharToMultiByte
LoadLibraryExA
RaiseException
ExpandEnvironmentStringsA
PeekNamedPipe
ReadFile
GetFileType
GetStdHandle
user32
BringWindowToTop
RegisterClassExW
ShowWindow
CreateWindowExW
SwitchToThisWindow
SetWindowTextW
DestroyIcon
GetWindowThreadProcessId
LoadIconW
SendMessageW
FindWindowExA
SetWindowPos
KillTimer
PostMessageW
GetWindowRect
SetTimer
DispatchMessageW
DefWindowProcW
OpenWindowStationW
GetSystemMetrics
SetThreadDesktop
SetWindowLongW
GetWindowLongW
TranslateMessage
CloseDesktop
OpenDesktopW
CloseWindowStation
PostQuitMessage
GetMessageW
SetProcessWindowStation
ReleaseCapture
MessageBoxIndirectW
SendMessageA
FindWindowW
SetForegroundWindow
GetShellWindow
gdi32
GetStockObject
advapi32
CryptCreateHash
CryptHashData
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
AdjustTokenPrivileges
DuplicateTokenEx
LookupPrivilegeValueW
GetTokenInformation
GetSidSubAuthorityCount
OpenThreadToken
GetSidSubAuthority
OpenProcessToken
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
FreeSid
SetEntriesInAclW
SetSecurityInfo
AllocateAndInitializeSid
GetSecurityInfo
CryptDestroyHash
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListW
SHChangeNotify
SHGetSpecialFolderLocation
ole32
CoUninitialize
CoInitializeEx
CoCreateGuid
CoCreateInstance
oleaut32
VariantInit
VariantClear
SysFreeString
SysAllocString
ws2_32
__WSAFDIsSet
sendto
gethostname
recvfrom
freeaddrinfo
WSACleanup
WSAStartup
listen
closesocket
WSASetLastError
bind
setsockopt
htons
WSAGetLastError
WSASend
WSASocketW
WSARecv
ioctlsocket
accept
select
recv
send
connect
getpeername
getsockname
getsockopt
ntohs
socket
WSAIoctl
getaddrinfo
wldap32
ord35
ord79
ord30
ord200
ord27
ord32
ord301
ord143
ord46
ord211
ord60
ord50
ord41
ord22
ord26
ord33
mswsock
AcceptEx
GetAcceptExSockaddrs
Sections
.text Size: 766KB - Virtual size: 765KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ