Static task
static1
Behavioral task
behavioral1
Sample
25c1e95b5d53052f973fe0d8c8bf2ac1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
25c1e95b5d53052f973fe0d8c8bf2ac1.exe
Resource
win10v2004-20231222-en
General
-
Target
25c1e95b5d53052f973fe0d8c8bf2ac1
-
Size
1.5MB
-
MD5
25c1e95b5d53052f973fe0d8c8bf2ac1
-
SHA1
7ca82d686fa73e029797365ea3acbc91ba68109c
-
SHA256
8b6d3ad635db2718e69e69f7880585385613b6f3c118d5d116dd5213f34590ed
-
SHA512
c16119fd40b674380f8df04533119c2889f6903034b7a733b55fa840ef332747be02ba1a97a86744cc06f258ccc6a7d5ce1e9edafb4cf452bb5d6e317f7fcfb9
-
SSDEEP
24576:AHO2QxywLyc/VkxxnKNDzR+QaMLWRh229pI8LTJXkLh+fRhc5wEH02mJ7izPS4e2:KO2QxzDV0xnaDd+8HKJ4PS4Y8Bld
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25c1e95b5d53052f973fe0d8c8bf2ac1
Files
-
25c1e95b5d53052f973fe0d8c8bf2ac1.exe windows:10 windows x64 arch:x64
26726e2f78645ad9c311f13886afe185
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
EventSetInformation
RegisterServiceCtrlHandlerW
SetServiceStatus
EventRegister
EventWriteTransfer
RegGetValueW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
DuplicateTokenEx
CreateProcessAsUserW
OpenProcessToken
SetTokenInformation
GetTokenInformation
RegQueryValueExW
EventUnregister
GetSidSubAuthority
GetSidSubAuthorityCount
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteKeyExW
RegDeleteValueW
RegEnumKeyExW
RegDeleteTreeW
RegQueryInfoKeyW
RegCreateKeyExW
RegEnumValueW
RegSetKeyValueW
GetNamedSecurityInfoW
CreateWellKnownSid
EqualSid
ConvertSidToStringSidW
StartServiceCtrlDispatcherW
kernel32
GetShortPathNameW
QueryFullProcessImageNameW
lstrcmpiW
GetSystemWindowsDirectoryW
GetCurrentProcessId
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
CloseHandle
Sleep
ProcessIdToSessionId
TlsGetValue
TlsAlloc
TlsSetValue
ResetEvent
OpenEventA
FormatMessageA
AreFileApisANSI
OpenProcess
DeviceIoControl
CreateDirectoryW
FreeLibrary
LocalAlloc
GetCurrentProcess
GetModuleFileNameW
lstrlenA
FindClose
FindNextFileW
FindFirstFileW
GetFileTime
SystemTimeToFileTime
GetFileSize
DeleteFileW
SetEvent
SetFileAttributesW
GetComputerNameExW
GetFileAttributesW
CreateFileW
ExpandEnvironmentStringsW
WriteFile
CreateEventA
ReadFile
GetLocalTime
IsDebuggerPresent
DebugBreak
GetProcessHeap
CreateMutexExW
GetProcAddress
HeapAlloc
OpenSemaphoreW
WaitForSingleObjectEx
ReleaseMutex
GetModuleHandleExW
ReleaseSemaphore
SetLastError
HeapFree
CreateSemaphoreExW
GetModuleFileNameA
TerminateProcess
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
DecodePointer
EncodePointer
DeleteCriticalSection
CreateIoCompletionPort
CreateThread
GetSystemInfo
GetQueuedCompletionStatus
GetProcessMitigationPolicy
WaitForSingleObject
LocalUnlock
LocalFree
FormatMessageW
LocalLock
OutputDebugStringW
GetLastError
IsWow64Process
GetCurrentDirectoryW
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
InitializeCriticalSectionEx
GetLocaleInfoW
EnterCriticalSection
LeaveCriticalSection
msvcrt
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
isdigit
isalnum
memcmp
___lc_collate_cp_func
memchr
tolower
isspace
_Strftime
_Gettnames
__mb_cur_max
_Wcsftime
_W_Gettnames
_W_Getmonths
_W_Getdays
_Getmonths
_Getdays
memcpy_s
ldexp
realloc
abort
_free_locale
_get_current_locale
__crtLCMapStringA
__crtLCMapStringW
__crtCompareStringA
__crtCompareStringW
??8type_info@@QEBAHAEBV0@@Z
_wcsdup
__uncaught_exception
islower
memset
_ismbblead
___mb_cur_max_func
calloc
___lc_codepage_func
___lc_handle_func
isupper
exit
setlocale
_unlock
_lock
_errno
memmove
memcpy
_CxxThrowException
??0exception@@QEAA@AEBQEBDH@Z
_callnewh
malloc
sprintf_s
localeconv
?name@type_info@@QEBAPEBDXZ
??0exception@@QEAA@XZ
strcspn
free
_vsnwprintf
_vsnprintf_s
fputc
fflush
fclose
fgetc
fwrite
fgetpos
setvbuf
ungetc
fsetpos
_fseeki64
_wcsicmp
_wtoi
strchr
ldiv
time
_wcsnicmp
_stricmp
strerror
fseek
_wfsopen
mbstowcs_s
__CxxFrameHandler3
??_V@YAXPEAX@Z
_purecall
swprintf_s
_exit
_cexit
__setusermatherr
_initterm
__C_specific_handler
_fmode
_commode
?terminate@@YAXXZ
__dllonexit
_onexit
??1type_info@@UEAA@XZ
??3@YAXPEAX@Z
__pctype_func
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBD@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
??0bad_cast@@QEAA@AEBV0@@Z
??0bad_cast@@QEAA@PEBD@Z
??1bad_cast@@UEAA@XZ
wcscmp
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
ole32
CoInitializeEx
CoTaskMemFree
CLSIDFromProgID
OleRun
CoUninitialize
CoCreateInstance
CLSIDFromString
oleaut32
SysStringLen
SysFreeString
SysAllocString
SysAllocStringByteLen
VariantClear
wintrust
WinVerifyTrust
fltlib
FilterReplyMessage
FilterGetMessage
FilterConnectCommunicationPort
shell32
SHGetKnownFolderPath
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
activeds
ord3
Sections
.text Size: 785KB - Virtual size: 784KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 307KB - Virtual size: 306KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 400KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ