Static task
static1
Behavioral task
behavioral1
Sample
4ac8f0d7b1a07ecafb8b11a1320afa20.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ac8f0d7b1a07ecafb8b11a1320afa20.exe
Resource
win10v2004-20231215-en
General
-
Target
4ac8f0d7b1a07ecafb8b11a1320afa20
-
Size
113KB
-
MD5
4ac8f0d7b1a07ecafb8b11a1320afa20
-
SHA1
4f71c6c33ddbc178cd482523a35de0b9e83816ab
-
SHA256
4fe0c6f8dbe9ee9820442ffbd5b12e4173bd88b6093a6ef0e9c3c5a99d38a02c
-
SHA512
5b02da5fcb019bee80cc24c4018cf083c4997e746b3cc1713324af26d5767fab2122a7f6f97cc4d4ad8b4f3e8abe5dc59f50a1ce55cf4ecb93bd7446e4ec7b49
-
SSDEEP
3072:DARRmewGAG4LXfTsuCVlP43woO7+D3MD:DDewGXkYuCVl6QC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ac8f0d7b1a07ecafb8b11a1320afa20
Files
-
4ac8f0d7b1a07ecafb8b11a1320afa20.exe windows:6 windows x64 arch:x64
dc7d30b90b2d8abf664fbed2b1b59894
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
Sleep
DeleteFileW
GetFileTime
CopyFileW
TerminateProcess
ResumeThread
GetFileAttributesW
LoadLibraryW
GetCurrentDirectoryW
SetCurrentDirectoryW
FreeLibrary
GetStartupInfoW
WaitForDebugEvent
InitializeProcThreadAttributeList
ContinueDebugEvent
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
CreateProcessW
TerminateThread
CreateThread
ExitProcess
FindFirstFileW
VirtualFree
FindNextFileW
GetCurrentProcess
FindClose
SetEvent
GetProcAddress
GetModuleHandleW
LoadLibraryExW
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
SetEndOfFile
LCMapStringW
LeaveCriticalSection
HeapAlloc
FileTimeToDosDateTime
GetTempFileNameA
WideCharToMultiByte
FileTimeToLocalFileTime
DeleteFileA
CreateFileA
GetTempPathA
GetFileInformationByHandle
SetFilePointer
WriteFile
ReadFile
LocalFree
CloseHandle
GetLastError
CreateEventW
LocalAlloc
WaitForSingleObject
SetLastError
EnterCriticalSection
HeapFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleExW
IsProcessorFeaturePresent
TlsSetValue
TlsGetValue
CreateFileW
RemoveDirectoryW
CompareFileTime
CreateDirectoryW
VirtualAlloc
MultiByteToWideChar
user32
SendMessageTimeoutW
advapi32
RegDeleteKeyW
QueryServiceStatusEx
RegFlushKey
RegEnumKeyExW
RegDeleteValueW
RegOpenKeyW
RegQueryValueExW
CreateProcessAsUserW
RegQueryInfoKeyW
RegEnumValueW
RegRenameKey
CreateWellKnownSid
RegCreateKeyW
RegCloseKey
CloseServiceHandle
OpenSCManagerW
RegCreateKeyExW
RegSetValueExW
StartServiceW
RegOpenKeyExW
OpenServiceW
shell32
SHCreateItemFromParsingName
ShellExecuteExW
ole32
CoCreateGuid
CoUninitialize
CoInitializeSecurity
CoCreateInstance
CoGetObject
CoTaskMemFree
StringFromCLSID
CoInitializeEx
oleaut32
SysAllocString
SysFreeString
SysStringLen
ntdll
NtAllocateVirtualMemory
RtlPrefixUnicodeString
NtDeleteValueKey
RtlImageNtHeader
NtFsControlFile
RtlGetCurrentPeb
NtQueryInformationFile
RtlFreeHeap
RtlEqualUnicodeString
LdrFindEntryForAddress
LdrAccessResource
RtlUnwindEx
RtlAllocateHeap
NtFreeVirtualMemory
RtlNtStatusToDosErrorNoTeb
NtDeleteKey
NtNotifyChangeDirectoryFile
NtWaitForSingleObject
NtCreateFile
NtSetEvent
NtCreateEvent
RtlDosPathNameToNtPathName_U
RtlImageDirectoryEntryToData
RtlFreeUnicodeString
NtTerminateProcess
NtReadFile
LdrFindResource_U
NtQueryInformationProcess
LdrGetDllHandle
NtEnumerateValueKey
DbgUiSetThreadDebugObject
RtlFreeSid
NtDuplicateObject
RtlLengthSid
RtlAllocateAndInitializeSid
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
NtSetInformationToken
NtRemoveProcessDebug
NtDuplicateToken
NtOpenProcessToken
NtSetValueKey
NtCreateKey
NtOpenKey
RtlAppendUnicodeToString
NtQuerySystemInformation
RtlAppendUnicodeStringToString
NtDeleteFile
RtlInitUnicodeString
NtClose
RtlNtdllName
RtlFormatCurrentUserKeyPath
rpcrt4
RpcStringFreeW
RpcStringBindingComposeW
NdrAsyncClientCall
UuidCreateNil
UuidCompare
RpcBindingSetAuthInfoExW
RpcAsyncCompleteCall
RpcBindingFromStringBindingW
RpcAsyncInitializeHandle
RpcBindingFree
RpcRaiseException
cabinet
ord13
ord14
ord11
ord10
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ