Static task
static1
Behavioral task
behavioral1
Sample
36b10b44d1e1dacc53ec9ccdbf2ed94f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36b10b44d1e1dacc53ec9ccdbf2ed94f.exe
Resource
win10v2004-20231215-en
General
-
Target
36b10b44d1e1dacc53ec9ccdbf2ed94f
-
Size
826KB
-
MD5
36b10b44d1e1dacc53ec9ccdbf2ed94f
-
SHA1
0a9d7c65fa5cfe36b9292c8f0a733d8a03dba433
-
SHA256
e8e9d8a983fb191023b66b09977ea8877077cbdbd92a8721e33b8783b534e77e
-
SHA512
4cd437c921bedabe199ceb9b3c1be80fe55002f2696cc9c11aefccbd66a96ed7ff37eded11bf9abeb8575a1b6fb5d18db6f6521ae97411036b6321fa9808e13b
-
SSDEEP
24576:IXSnogjTlMNo6KI4DOlLHnNknRcO6IwQ1DQyhE:5jTlio6KI4DEjiRd6IwQ1Dg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36b10b44d1e1dacc53ec9ccdbf2ed94f
Files
-
36b10b44d1e1dacc53ec9ccdbf2ed94f.exe windows:5 windows x86 arch:x86
9b6a47833d19a2c63a591cf3d2ca5893
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleOutputA
VerSetConditionMask
VirtualAlloc
WaitForDebugEvent
EnumerateLocalComputerNamesW
GlobalFindAtomA
ReadFile
VDMOperationStarted
SetFirmwareEnvironmentVariableW
Thread32Next
SetProcessPriorityBoost
GetSystemWindowsDirectoryA
VerifyVersionInfoW
LoadLibraryA
SetMessageWaitingIndicator
GetTimeZoneInformation
DeleteCriticalSection
EnumTimeFormatsW
Module32FirstW
SetCalendarInfoW
ClearCommError
GetNumberOfConsoleMouseButtons
GetCompressedFileSizeA
_lopen
GetStartupInfoA
GetUserDefaultLangID
EnumTimeFormatsA
DuplicateHandle
GlobalFlags
GetTempFileNameW
EnterCriticalSection
LeaveCriticalSection
_lwrite
SetTimeZoneInformation
ConvertFiberToThread
FindFirstFileExA
ntdll
NtOpenProcessToken
LdrLoadAlternateResourceModule
NtSetLowEventPair
RtlGetDaclSecurityDescriptor
NtDeleteBootEntry
NtSetVolumeInformationFile
RtlEqualPrefixSid
NtSetThreadExecutionState
RtlNtPathNameToDosPathName
wcsstr
ZwAlertResumeThread
RtlMultiByteToUnicodeN
ZwCreateTimer
ZwReleaseKeyedEvent
ZwSetInformationProcess
RtlValidAcl
ZwCreateThread
RtlAddAccessDeniedAce
NtReleaseMutant
RtlAddAtomToAtomTable
RtlAreAnyAccessesGranted
RtlApplyRXactNoFlush
memset
RtlEnumerateGenericTable
RtlQueryAtomInAtomTable
RtlAppendAsciizToString
RtlGetGroupSecurityDescriptor
ZwSetUuidSeed
NtReplyWaitReceivePortEx
LdrProcessRelocationBlock
RtlQueryProcessLockInformation
RtlDestroyProcessParameters
RtlAbortRXact
RtlQueueApcWow64Thread
RtlInitUnicodeStringEx
NtSetTimerResolution
NtAccessCheck
NtAllocateUserPhysicalPages
RtlPinAtomInAtomTable
DbgSetDebugFilterState
strtol
RtlGetActiveActivationContext
ZwResumeProcess
RtlMultiByteToUnicodeSize
_wcsupr
iswalpha
_wtoi
ZwClearEvent
RtlOemStringToUnicodeString
RtlValidateUnicodeString
_ui64tow
toupper
_CIsqrt
RtlCancelTimer
CsrCaptureTimeout
ZwOpenJobObject
msvcrt40
_mbcjistojms
wcsncmp
feof
_CIlog10
??0filebuf@@QAE@ABV0@@Z
?flush@ostream@@QAEAAV1@XZ
??0istream@@IAE@ABV0@@Z
??6ostream@@QAEAAV0@P6AAAVios@@AAV1@@Z@Z
?adjustfield@ios@@2JB
??5istream@@QAEAAV0@AAG@Z
_abnormal_termination
_wcsicoll
_sys_nerr
??0Iostream_init@@QAE@XZ
?get@istream@@IAEAAV1@PADHH@Z
_fcloseall
_adj_fdivr_m64
?writepad@ostream@@AAEAAV1@PBD0@Z
??0bad_cast@@QAE@ABQBD@Z
_mbstrlen
??_Eistream@@UAEPAXI@Z
??0stdiostream@@QAE@ABV0@@Z
abs
??_7stdiostream@@6B@
isspace
_wexecvpe
??5istream@@QAEAAV0@AAK@Z
_wcsicmp
_wexeclpe
?unbuffered@streambuf@@IAEXH@Z
_getw
??4ios@@IAEAAV0@ABV0@@Z
??6ostream@@QAEAAV0@M@Z
iswxdigit
??0strstreambuf@@QAE@ABV0@@Z
??_7ostrstream@@6B@
_mbscpy
_execle
?peek@istream@@QAEHXZ
ldiv
?unlockbuf@ios@@QAAXXZ
??_8istream_withassign@@7B@
iswprint
iassvcs
DllUnregisterServer
IASGetDictionary
IASUninitialize
IASGetHostByName
IASRequestThread
IASGetLocalDictionary
IASVariantChangeType
DllRegisterServer
IASReportEvent
IASSetMaxThreadIdle
IASSetMaxNumberOfThreads
IASAllocateUniqueID
IASRegisterComponent
IASRadiusCrypt
IASInitialize
IASAdler32
DllGetClassObject
fmifs
EnableVolumeCompression
DiskCopy
QueryFileSystemName
ComputeFmMediaType
FormatEx2
QueryDeviceInformation
QueryLatestFileSystemVersion
QuerySupportedMedia
SetLabel
FormatEx
Extend
ChkdskEx
QueryDeviceInformationByHandle
Format
Chkdsk
QueryAvailableFileSystemFormat
advapi32
GetTraceLoggerHandle
CryptSignHashW
GetSidSubAuthority
SetFileSecurityW
A_SHAUpdate
GetPrivateObjectSecurity
RegisterEventSourceW
ConvertStringSecurityDescriptorToSecurityDescriptorW
EnumerateTraceGuids
SaferIdentifyLevel
ObjectPrivilegeAuditAlarmW
LookupAccountNameA
AdjustTokenPrivileges
ConvertSecurityDescriptorToAccessNamedW
IsValidSecurityDescriptor
CloseEncryptedFileRaw
RegOpenCurrentUser
EncryptFileA
CredDeleteA
WmiQuerySingleInstanceW
QueryServiceLockStatusA
DeleteAce
SetAclInformation
GetServiceKeyNameW
LookupSecurityDescriptorPartsA
CredWriteDomainCredentialsW
GetWindowsAccountDomainSid
LsaLookupNames
CryptGenKey
CredProfileLoaded
WmiSetSingleItemW
CredMarshalCredentialW
CryptDuplicateHash
TraceMessage
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 734KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ