Static task
static1
Behavioral task
behavioral1
Sample
executable.2096.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
executable.2096.exe
Resource
win10v2004-20231222-en
General
-
Target
executable.2096.exe
-
Size
295KB
-
MD5
e56837c21cca18641f06d375a49aabdc
-
SHA1
1fb64eaedc67f4d047b26d5f273da7dfb064aaf2
-
SHA256
f4e11452998102e7f353d5d3abf605ea71b6057970030fcf419ce72f5476b01a
-
SHA512
2162dc598f725e35a8c688d499944a9e8ce4c90a679a93d5b19c0b5b986dd9329c39a9a1886b76fe70602f215350b5d6e788e2ac36f78a86e4b969d2850f47ef
-
SSDEEP
3072:RFtn1cZcSrNdNQG2y7I1F5Xd0vPgxsk0h:ft1cZcShQHR8Pgxsk0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource executable.2096.exe
Files
-
executable.2096.exe.exe windows:6 windows x86 arch:x86
Password: infected
ceefb55f764020cc5c5f8f23349ab163
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
exit
_getch
iswdigit
wcstol
_vsnwprintf
_wcsicmp
_controlfp
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_XcptFilter
_exit
_cexit
__getmainargs
calloc
free
_wcslwr
qsort
_dup2
_dup
_open_osfhandle
_close
swscanf
_ultoa
_pipe
_setmode
wcsncmp
iswxdigit
_wtol
time
srand
fflush
_get_osfhandle
_setjmp3
wcsstr
_local_unwind4
_errno
wcstoul
iswalpha
rand
wcsrchr
memcpy
printf
_iob
fprintf
towlower
realloc
setlocale
_wcsupr
_wpopen
ferror
fgets
feof
_pclose
memmove
wcschr
_tell
iswspace
memset
wcsspn
towupper
longjmp
_wcsnicmp
ntdll
RtlNtStatusToDosError
NtSetInformationProcess
NtQueryInformationProcess
RtlFindLeastSignificantBit
RtlFreeHeap
NtFsControlFile
RtlDosPathNameToNtPathName_U
NtQueryInformationToken
NtClose
NtOpenProcessToken
NtOpenThreadToken
kernel32
GetDateFormatW
UnhandledExceptionFilter
GetCurrentProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
Sleep
InterlockedExchange
LoadLibraryExA
InterlockedCompareExchange
FreeLibrary
DelayLoadFailureHook
CreateHardLinkW
CreateSymbolicLinkW
GetVolumePathNameW
GetThreadLocale
GetThreadGroupAffinity
GetNumaNodeProcessorMaskEx
SetProcessAffinityMask
ResumeThread
FindFirstFileExW
DeviceIoControl
FindFirstStreamW
FindNextStreamW
GetDiskFreeSpaceExW
CompareFileTime
RemoveDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
TerminateProcess
WaitForSingleObject
GetExitCodeProcess
CopyFileW
SetFileAttributesW
SetEndOfFile
DeleteFileW
SetFileTime
CreateDirectoryW
FillConsoleOutputAttribute
SetConsoleTextAttribute
ScrollConsoleScreenBufferW
FormatMessageW
GetACP
DuplicateHandle
FlushFileBuffers
HeapReAlloc
HeapSize
VirtualAlloc
VirtualFree
GetCurrentThreadId
OpenThread
HeapSetInformation
GetFileAttributesExW
GetDriveTypeW
InitializeCriticalSection
SetConsoleCtrlHandler
GetWindowsDirectoryW
GetVersion
GetModuleFileNameW
ExpandEnvironmentStringsW
CancelSynchronousIo
EnterCriticalSection
LeaveCriticalSection
GetVolumeInformationW
SearchPathW
WriteFile
SetFilePointerEx
GlobalAlloc
GlobalFree
MoveFileW
SetConsoleTitleW
LocalFree
MoveFileExW
GetConsoleTitleW
GetFileAttributesW
NeedCurrentDirectoryForExePathW
GetBinaryTypeW
SetFilePointer
lstrcmpW
lstrcmpiW
HeapFree
GetProcessHeap
SetThreadLocale
GetProcAddress
GetModuleHandleW
VirtualQuery
HeapAlloc
CloseHandle
MultiByteToWideChar
ReadFile
WriteConsoleW
FillConsoleOutputCharacterW
SetConsoleCursorPosition
ReadConsoleW
GetConsoleScreenBufferInfo
GetStdHandle
GetFileType
GetLastError
WideCharToMultiByte
GetFileSize
FlushConsoleInputBuffer
GetCPInfo
GetConsoleOutputCP
CmdBatNotification
CreateFileW
FindClose
FindNextFileW
FindFirstFileW
GetFullPathNameW
GetUserDefaultLCID
SetLocalTime
SystemTimeToFileTime
GetSystemTime
FileTimeToSystemTime
GetLocaleInfoW
FileTimeToLocalFileTime
GetTimeFormatW
GetLocalTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetEnvironmentVariableW
SetEnvironmentStringsW
SetConsoleMode
GetConsoleMode
GetNumaHighestNodeNumber
GetCommandLineW
GetEnvironmentVariableW
SetErrorMode
GetVDMCurrentDirectories
RegCloseKey
SetLastError
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyExW
ReadProcessMemory
LoadLibraryW
QueryFullProcessImageNameW
GetConsoleWindow
CreateProcessW
GetStartupInfoW
DeleteProcThreadAttributeList
UpdateProcThreadAttribute
InitializeProcThreadAttributeList
RegSetValueExW
RegCreateKeyExW
winbrand
BrandingFormatString
Sections
.text Size: 139KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ