Static task
static1
Behavioral task
behavioral1
Sample
b7bb3832847c61b65fc74682ed0f4e4569a0cc1f95706e500c93818c2fda1575.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b7bb3832847c61b65fc74682ed0f4e4569a0cc1f95706e500c93818c2fda1575.exe
Resource
win10v2004-20231215-en
General
-
Target
b7bb3832847c61b65fc74682ed0f4e4569a0cc1f95706e500c93818c2fda1575
-
Size
508KB
-
MD5
c59451bc524ea6abcd6e7c37ba34a832
-
SHA1
57f8d3f5f3a6d7a1c8422b7887f3ddf9b3e148ff
-
SHA256
b7bb3832847c61b65fc74682ed0f4e4569a0cc1f95706e500c93818c2fda1575
-
SHA512
47af36ba35e7f92200a8f88005ada071124090aa461d8e8d6b6a80bfce65a4311c4bf52951ffdc8015e8d98f07b2b185b5ae8e45c16f49c48ff4e138bae77099
-
SSDEEP
6144:8TNIQ/ZukG4t+A4YAGF9rqocFlrvLK5ZEbGeGCmltAOTPou54:8rIkGA+AB9F92sMGeGCQtd2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7bb3832847c61b65fc74682ed0f4e4569a0cc1f95706e500c93818c2fda1575
Files
-
b7bb3832847c61b65fc74682ed0f4e4569a0cc1f95706e500c93818c2fda1575.exe windows:4 windows x86 arch:x86
58dbeae88109fc17527fc4023fdb428b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
CreateMutexA
LocalFree
CreateFileA
OpenProcess
Sleep
OpenMutexA
CreateFileMappingA
SetUnhandledExceptionFilter
CloseHandle
GetWindowsDirectoryA
SetEvent
EnterCriticalSection
GetCurrentProcess
GetPrivateProfileStringA
QueryDosDeviceA
Process32NextW
GetLogicalDriveStringsA
Process32FirstW
CreateToolhelp32Snapshot
DuplicateHandle
SetFileAttributesA
OpenFileMappingA
GetFileSize
GetProcessTimes
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentDirectoryW
SetFilePointer
SystemTimeToFileTime
LocalFileTimeToFileTime
GetTickCount
CreateEventA
WaitForSingleObject
GetCurrentProcessId
InitializeCriticalSection
GetFileAttributesA
LeaveCriticalSection
OutputDebugStringA
UnmapViewOfFile
MapViewOfFile
GetLastError
OpenEventA
GetModuleFileNameA
WriteFile
WaitNamedPipeA
CreateDirectoryA
SetEndOfFile
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
GetStringTypeW
ReadFile
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
DeleteCriticalSection
ExitThread
GetCurrentThreadId
CreateThread
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetProcAddress
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
GetACP
GetOEMCP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
FlushFileBuffers
user32
wsprintfA
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
RegDeleteValueA
SetNamedSecurityInfoA
GetNamedSecurityInfoA
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
SetEntriesInAclA
BuildExplicitAccessWithNameA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHChangeNotify
ole32
CoCreateGuid
CoInitialize
psapi
GetProcessImageFileNameA
iphlpapi
GetAdaptersInfo
wininet
InternetReadFile
InternetQueryOptionA
InternetCloseHandle
InternetConnectA
InternetSetOptionA
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
HttpQueryInfoA
Sections
.text Size: 380KB - Virtual size: 379KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ