Static task
static1
Behavioral task
behavioral1
Sample
2511b5f6a166bf77a499a025ac3d2cff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2511b5f6a166bf77a499a025ac3d2cff.exe
Resource
win10v2004-20231215-en
General
-
Target
2511b5f6a166bf77a499a025ac3d2cff
-
Size
149KB
-
MD5
2511b5f6a166bf77a499a025ac3d2cff
-
SHA1
a94bf1e95ef64eb1cd60016bc1d33b05a24d4fd5
-
SHA256
dca6c71c2c2a70b3e7809e3e6423d324bb7f23dd21f946da90dd27551d9d1d6c
-
SHA512
130db6f1745987534507a98d8ccb65bf3568e55315c702de10c0b1dc09e74dcffe1d02970a0215a0914d57f907d8e4d550414dea92157cfc09edce32c4e5d6ad
-
SSDEEP
3072:RWfBl6kfPer8lBK35UW2bUwI7rvZe9PHtmqYVYwH:R4F82bCrxGPQq6H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2511b5f6a166bf77a499a025ac3d2cff
Files
-
2511b5f6a166bf77a499a025ac3d2cff.exe windows:4 windows x86 arch:x86
369ea3562e764cdf2a4864389af0b1a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
FreeLibrary
MultiByteToWideChar
LoadLibraryExW
GetModuleHandleW
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
SetProcessWorkingSetSize
GetCurrentProcess
CloseHandle
WaitForSingleObject
GetTickCount
CreateProcessW
CreateFileW
GetFileAttributesW
OpenProcess
GetCurrentProcessId
ReleaseMutex
GetProcAddress
Sleep
CreateThread
CreateEventW
GetCurrentThreadId
SetEvent
CreateMutexW
GetVersion
GetCommandLineW
WideCharToMultiByte
LoadLibraryA
GetWindowsDirectoryA
GetSystemDirectoryA
GetModuleFileNameA
GetVersionExW
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
InterlockedIncrement
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
lstrcmpiW
GetLastError
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetStringTypeW
GetStringTypeA
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetCPInfo
GetStartupInfoW
ExitProcess
GetModuleHandleA
GetSystemTimeAsFileTime
RtlUnwind
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
GetStdHandle
WriteFile
WriteConsoleA
lstrlenW
HeapCreate
VirtualAlloc
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
user32
CharNextW
SendMessageW
IsWindow
SendMessageTimeoutW
GetWindowThreadProcessId
PostQuitMessage
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
PostThreadMessageW
CharUpperW
UnregisterClassA
advapi32
RegSetValueExW
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
ole32
StringFromGUID2
CLSIDFromString
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoInitialize
CoCreateInstance
CoRevokeClassObject
CoRegisterClassObject
CoUninitialize
oleaut32
VariantChangeType
VariantClear
VariantInit
RegisterTypeLi
UnRegisterTypeLi
SysStringByteLen
SysAllocStringByteLen
SysAllocString
LoadTypeLi
LoadRegTypeLi
SysStringLen
VarUI4FromStr
SysFreeString
wintrust
CryptCATAdminReleaseCatalogContext
CryptCATAdminAcquireContext
CryptCATAdminReleaseContext
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminEnumCatalogFromHash
CryptCATCatalogInfoFromContext
WinVerifyTrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WTHelperGetProvCertFromChain
crypt32
CertGetNameStringW
psapi
GetModuleFileNameExW
Sections
.text Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hf Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE