Static task
static1
Behavioral task
behavioral1
Sample
774489aa53755e4bc4bcd006709f44367d9421e3dee6dbf90465140b4e1ff0ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
774489aa53755e4bc4bcd006709f44367d9421e3dee6dbf90465140b4e1ff0ba.exe
Resource
win10v2004-20231222-en
General
-
Target
774489aa53755e4bc4bcd006709f44367d9421e3dee6dbf90465140b4e1ff0ba
-
Size
330KB
-
MD5
26ae43727afbe026e7493e4183fab54b
-
SHA1
443729e57d3c009ef9439fb4cf981fd8175a54b2
-
SHA256
774489aa53755e4bc4bcd006709f44367d9421e3dee6dbf90465140b4e1ff0ba
-
SHA512
06a868fcc05592e681735e0c3246e23c2569ef757ff59b7a5df563bae183724e3b222d0b608308146b0ba6f05f2f1c5b888bbd35948313ed31d4cdd980cd98b9
-
SSDEEP
6144:x7yWsD4sZX7WIJG9ybIU+V14evd5j6Mab1NX6+ZLBgX2ngLNQZCdXdSQn:9yWsD3kbEIIID6MabbXaJm7Qn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 774489aa53755e4bc4bcd006709f44367d9421e3dee6dbf90465140b4e1ff0ba
Files
-
774489aa53755e4bc4bcd006709f44367d9421e3dee6dbf90465140b4e1ff0ba.exe windows:6 windows x86 arch:x86
5d05848fa93a48b3bb487699bc9b1225
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
DeviceIoControl
lstrcmpA
SizeofResource
VirtualProtect
HeapFree
GetModuleFileNameW
InitializeCriticalSectionEx
HeapSize
GetLastError
LockResource
HeapReAlloc
RaiseException
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
IsBadReadPtr
SetUnhandledExceptionFilter
DeleteFileW
CloseHandle
GetCurrentProcess
lstrlenW
lstrcpynW
MultiByteToWideChar
FreeLibrary
WideCharToMultiByte
EncodePointer
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
FormatMessageW
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
OutputDebugStringW
GetProcAddress
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlUnwind
ExitThread
GetModuleHandleExW
GetStdHandle
WriteFile
ExitProcess
GetCommandLineA
GetCommandLineW
GetFileType
CompareStringW
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
CreateFileW
WriteConsoleW
LoadLibraryW
SignalObjectAndWait
Sleep
shlwapi
SHSetValueA
SHGetValueW
wnsprintfW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
iphlpapi
GetAdaptersInfo
wininet
InternetGetConnectedState
urlmon
URLDownloadToFileW
URLDownloadToCacheFileW
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
RegEnumKeyExW
netapi32
Netbios
Sections
.text Size: 250KB - Virtual size: 250KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ