Static task
static1
Behavioral task
behavioral1
Sample
475e120ce429d81686d258b6bea88d06.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
475e120ce429d81686d258b6bea88d06.exe
Resource
win10v2004-20231215-en
General
-
Target
475e120ce429d81686d258b6bea88d06
-
Size
141KB
-
MD5
475e120ce429d81686d258b6bea88d06
-
SHA1
36eec058c2d273ae10b4e0ffeec916152d867de9
-
SHA256
7d9d41b84e2ae31173c32efbcb51bef08615c3aa2450b286018949e825156d00
-
SHA512
a6bdf2c5498c8b61e6d7981a42147abf748817aab194149dc641930bf9a73c86e50ddf55cfbfcf6e72d9dbefb9dbe27673de3e696b99fcc3f79725a18089d61f
-
SSDEEP
3072:CdHv1RprWPbAJz75DnNkZMROdD+jiByXpfQiQXXiOsne2iR4ObK:qH9TrWTAV5DnNxROdDPByXpfBQHiOsnM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 475e120ce429d81686d258b6bea88d06
Files
-
475e120ce429d81686d258b6bea88d06.exe windows:5 windows x64 arch:x64
36381f796969e475e999400701fdb3cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetSystemDirectoryW
GetWindowsDirectoryW
GetTempPathW
Sleep
WriteFile
ReadFile
GetFileAttributesW
GetLastError
DeviceIoControl
CreateFileA
FreeResource
FindResourceW
SetFileAttributesW
CreateProcessW
GetModuleHandleW
SizeofResource
LockResource
GetModuleFileNameA
GetTempPathA
OpenProcess
VerSetConditionMask
VerifyVersionInfoW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
DebugBreak
OutputDebugStringW
LoadLibraryW
CreateFileW
FreeLibrary
GetModuleFileNameW
GetProcAddress
CloseHandle
lstrlenA
lstrlenW
DeleteCriticalSection
GetStartupInfoW
TerminateProcess
LoadResource
UnhandledExceptionFilter
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
GetCurrentProcess
InitializeCriticalSection
user32
LoadStringW
CharNextW
advapi32
ControlService
UnlockServiceDatabase
ChangeServiceConfigW
QueryServiceStatus
StartServiceW
LockServiceDatabase
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
QueryServiceConfigW
shell32
ShellExecuteA
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetMalloc
msvcr90
??2@YAPEAX_K@Z
_wfopen_s
wcsncpy_s
sprintf_s
strncmp
strcpy_s
_itow_s
fwrite
strrchr
strcat_s
fclose
?what@exception@std@@UEBAPEBDXZ
??1exception@std@@UEAA@XZ
??0exception@std@@QEAA@XZ
??0exception@std@@QEAA@AEBQEBD@Z
??0exception@std@@QEAA@AEBV01@@Z
_invalid_parameter_noinfo
wcsstr
free
_wcsicmp
__C_specific_handler
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__wgetmainargs
_XcptFilter
_exit
_cexit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
__crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
exit
wcsrchr
memcmp
iswdigit
memset
vswprintf_s
??_U@YAPEAX_K@Z
wcscat_s
memcpy_s
??_V@YAXPEAX@Z
memcpy
__CxxFrameHandler3
_CxxThrowException
??3@YAXPEAX@Z
_wtoi
msvcp90
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QEAA@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QEAA@PEBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QEAA@AEBV01@@Z
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 476B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ