Static task
static1
Behavioral task
behavioral1
Sample
43f68be0162b448dd1919477ca426ca0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43f68be0162b448dd1919477ca426ca0.exe
Resource
win10v2004-20231215-en
General
-
Target
43f68be0162b448dd1919477ca426ca0
-
Size
208KB
-
MD5
43f68be0162b448dd1919477ca426ca0
-
SHA1
067d9be812d9097c84dac382deb94399b59fc2af
-
SHA256
2b7ffe47b3fabf81a76386ee953d281aeaa158f4926896fcc1425c3844e73597
-
SHA512
a2d09cec57bd8ae6206b38dc5dfbf7a7f886c05208651ad162e4326c98efba7c2d08fee6efb71e6916caa0a98f1f80e4e22699c5e141241156fa5c37dc3f7a98
-
SSDEEP
3072:2m3u1dx0fZ5scU1Vbyam7Mv7v6AIFUWNV2JdVDJeLq:2XyfZT/viuirC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43f68be0162b448dd1919477ca426ca0
Files
-
43f68be0162b448dd1919477ca426ca0.exe windows:6 windows x64 arch:x64
32d670c429de7271fe592f061974ff91
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
FreeLibrary
VirtualFree
VirtualAlloc
VirtualUnlock
VirtualLock
GetCurrentProcessId
HeapSetInformation
Sleep
DeleteFileW
SetDllDirectoryW
LoadLibraryExW
CreateEventW
GetProcAddress
HeapAlloc
GetProcessHeap
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetCommandLineW
GetStdHandle
GetModuleFileNameW
GetSystemInfo
GetModuleHandleW
GetSystemTimeAsFileTime
GetFirmwareEnvironmentVariableW
WriteConsoleW
GetSystemDirectoryA
LoadLibraryExA
CloseHandle
WaitForSingleObject
SetLastError
GetLastError
CreateFileW
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
LCMapStringW
CompareStringW
HeapFree
GetCommandLineA
GetModuleHandleExW
TerminateProcess
ExitProcess
GetCurrentProcess
WriteFile
RaiseException
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
advapi32
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
ntdll
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
LdrAccessResource
RtlTimeToSecondsSince1970
NtLoadDriver
RtlSetLastWin32Error
RtlCreateSecurityDescriptor
RtlCreateAcl
RtlInitString
RtlFreeHeap
NtQueryDirectoryObject
RtlExpandEnvironmentStrings
NtOpenDirectoryObject
NtFlushBuffersFile
RtlAddAccessAllowedAce
RtlLengthRequiredSid
LdrFindResource_U
RtlDosPathNameToNtPathName_U
RtlFreeUnicodeString
RtlSetDaclSecurityDescriptor
RtlSubAuthoritySid
NtUnloadDriver
NtWriteFile
RtlAllocateHeap
LdrGetProcedureAddress
RtlInitializeSid
NtOpenProcessToken
NtAdjustPrivilegesToken
NtOpenProcess
NtDuplicateObject
NtSetSecurityObject
RtlDoesFileExists_U
RtlGetVersion
LdrUnloadDll
NtDeviceIoControlFile
NtQuerySystemInformation
NtMapViewOfSection
NtUnmapViewOfSection
RtlNtStatusToDosError
NtClose
RtlImageNtHeader
LdrLoadDll
RtlInitUnicodeString
NtCreateSection
NtCreateFile
rpcrt4
UuidCreate
msdelta
ApplyDeltaB
DeltaFree
Sections
.text Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
redx Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ