Static task
static1
Behavioral task
behavioral1
Sample
190fbee46a1824feee06569aa79f651f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
190fbee46a1824feee06569aa79f651f.exe
Resource
win10v2004-20231215-en
General
-
Target
190fbee46a1824feee06569aa79f651f
-
Size
12.2MB
-
MD5
190fbee46a1824feee06569aa79f651f
-
SHA1
53ad94314c6b0cd4cddce50a73c629cdc8fbf4a0
-
SHA256
94822641c01bf60fce29c05b2eaa530b73346acbf888869cc7205451139ded16
-
SHA512
002637e504dcff6a25f5689f001edf08c43566ba8cf34387d072e9245c4f00704721e6c8b53c2e741d76789f68927af3e30a35dcf30bff05ea1dc1ea7439f6f1
-
SSDEEP
49152:sHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHn:
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 190fbee46a1824feee06569aa79f651f
Files
-
190fbee46a1824feee06569aa79f651f.exe windows:5 windows x86 arch:x86
65cee1cc96d935afa5d7eb55e18fefb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalDeleteAtom
FindFirstFileW
TlsGetValue
GetStringTypeA
SetLocalTime
GetDriveTypeW
GetNumberOfConsoleInputEvents
MapUserPhysicalPages
CallNamedPipeA
InterlockedIncrement
GetCommState
InterlockedDecrement
ScrollConsoleScreenBufferW
WritePrivateProfileSectionA
WaitForSingleObject
WriteConsoleInputA
SignalObjectAndWait
OpenSemaphoreA
CreateDirectoryExA
FreeEnvironmentStringsA
GetModuleHandleW
GetPrivateProfileStringW
GetConsoleTitleA
WriteFileGather
FindResourceExA
GetPrivateProfileStructW
SetVolumeMountPointA
GetSystemTimeAdjustment
GlobalFlags
GetComputerNameExA
Beep
SetMessageWaitingIndicator
VerifyVersionInfoA
GetBinaryTypeA
GetAtomNameW
ReadFile
CreateFileW
CompareStringW
GetACP
lstrlenW
LCMapStringA
VerifyVersionInfoW
CreateDirectoryA
HeapReAlloc
SetCurrentDirectoryA
OpenMutexW
IsDBCSLeadByteEx
GetProcAddress
SetVolumeLabelW
SetStdHandle
SetComputerNameA
CreateMemoryResourceNotification
SetFileApisToOEM
Process32FirstW
OpenWaitableTimerW
LocalAlloc
GetFileType
SetConsoleOutputCP
QueryDosDeviceW
WriteProfileSectionW
GetCommMask
AddAtomA
SetCommMask
EnumResourceTypesW
SetConsoleCursorInfo
GetThreadPriority
SetConsoleTitleW
GetModuleHandleA
EnumResourceNamesA
FindNextFileW
RequestWakeupLatency
BuildCommDCBA
GetCurrentDirectoryA
SetCalendarInfoA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
FindActCtxSectionStringW
ReadConsoleOutputCharacterW
InterlockedPushEntrySList
GetProfileSectionW
GetVolumeInformationW
CloseHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
RaiseException
InterlockedExchange
FileTimeToDosDateTime
GetLastError
MoveFileA
GetCommandLineW
HeapSetInformation
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
DecodePointer
ExitProcess
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapValidate
IsBadReadPtr
EncodePointer
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapCreate
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
HeapAlloc
GetModuleFileNameA
HeapSize
HeapQueryInformation
HeapFree
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
IsProcessorFeaturePresent
FlushFileBuffers
user32
GetCursorInfo
GetMenuInfo
GetMessageTime
GetMenuBarInfo
advapi32
InitiateSystemShutdownW
Sections
.text Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11.9MB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ