GetHandleVerifier
Static task
static1
Behavioral task
behavioral1
Sample
324d6abe1a283702d1295e34c181c0c688a2a789c5098b96e7702ff248ec5e99.exe
Resource
win7-20231215-en
General
-
Target
324d6abe1a283702d1295e34c181c0c688a2a789c5098b96e7702ff248ec5e99
-
Size
2.1MB
-
MD5
f99a0aaa7d7cd3154c912efb12146f29
-
SHA1
42bc97dee6f121ef0e1071c36a50c198dec93fc8
-
SHA256
324d6abe1a283702d1295e34c181c0c688a2a789c5098b96e7702ff248ec5e99
-
SHA512
12b9c58bf1b63d449d8f72ee78d5e796b9d6e418608b67a010ac5efc85c1c1ae56c1cd6d71444e16ff2696005db62c62870347424bb2101efc4dbc834aac8b70
-
SSDEEP
49152:NUgvZl/oWfOyt3rlPku6ZRAouDFMyDgkAPZNqPYayvYNhVes:mgvPnqAouDF9XAPWP9yvMVV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 324d6abe1a283702d1295e34c181c0c688a2a789c5098b96e7702ff248ec5e99
Files
-
324d6abe1a283702d1295e34c181c0c688a2a789c5098b96e7702ff248ec5e99.exe windows:6 windows x86 arch:x86
07eb12df2dff9a168484413aafb4f746
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
powrprof
PowerDeterminePlatformRole
setupapi
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
CM_Get_Device_IDW
kernel32
GetTickCount
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FileTimeToSystemTime
ProcessIdToSessionId
GetCommandLineW
GetDiskFreeSpaceExW
GetVolumeInformationW
QueryDosDeviceW
GetTempPathW
GetCurrentProcessId
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetVersion
GetSystemDirectoryW
LocalAlloc
lstrcmpW
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
CopyFileW
MoveFileExW
WTSGetActiveConsoleSessionId
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
CreateEventW
CreateThread
MoveFileW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
LoadLibraryExW
lstrcmpiW
GetEnvironmentVariableW
lstrlenW
GetProcessId
GetModuleHandleA
GetTempFileNameW
GetLogicalDriveStringsW
GetVolumePathNameW
ReplaceFileW
SetCurrentDirectoryW
GetFileAttributesExW
GetNativeSystemInfo
CreateMutexW
FormatMessageA
OutputDebugStringA
ReleaseMutex
RegisterWaitForSingleObject
UnregisterWaitEx
FindFirstFileExW
SystemTimeToTzSpecificLocalTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
SetEndOfFile
SetFilePointerEx
UnlockFile
LockFile
GetLocalTime
GetFileSizeEx
DuplicateHandle
Sleep
SetThreadPriority
GetThreadPriority
IsDebuggerPresent
GetUserDefaultLangID
TryEnterCriticalSection
GetModuleHandleExW
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetInformationJobObject
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
WaitForMultipleObjects
GlobalMemoryStatusEx
RtlCaptureStackBackTrace
QueueUserWorkItem
GetModuleHandleExA
GetProcessHeaps
HeapSetInformation
HeapUnlock
HeapLock
HeapWalk
GetProcessIoCounters
VirtualQueryEx
GetProcessTimes
GetSystemInfo
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
WriteConsoleW
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
FatalAppExitA
ReadConsoleW
CreateSemaphoreW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStdHandle
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
GetFileInformationByHandle
IsValidCodePage
AreFileApisANSI
ExitProcess
GetConsoleMode
GetConsoleCP
GetFileType
SetStdHandle
SetConsoleCtrlHandler
IsProcessorFeaturePresent
VirtualQuery
VirtualProtect
DeleteCriticalSection
InitializeCriticalSectionEx
SystemTimeToFileTime
SetFileTime
SetFilePointer
LocalFileTimeToFileTime
GetCurrentDirectoryW
GetCurrentThread
GetCurrentProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LoadLibraryW
FreeLibrary
GetWindowsDirectoryW
OpenProcess
WaitForSingleObject
LocalFree
GetProcAddress
GetModuleHandleW
GetVersionExW
DeviceIoControl
SetLastError
SetFileAttributesW
GetLongPathNameW
GetFullPathNameW
ExpandEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
WriteFile
ReadFile
GetFileSize
CreateFileW
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameW
FindResourceExW
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
RemoveDirectoryW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
CreateDirectoryW
EnumSystemLocalesW
GetDriveTypeW
GetFullPathNameA
SetEnvironmentVariableA
DecodePointer
FlushFileBuffers
LoadLibraryExA
VirtualAlloc
RtlUnwind
EncodePointer
OutputDebugStringW
user32
GetClassNameW
CreateWindowExW
EnumWindows
GetWindowLongW
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
DefWindowProcW
DestroyWindow
CharNextW
UnregisterClassW
GetDesktopWindow
GetDC
ExitWindowsEx
SetTimer
PostQuitMessage
KillTimer
WaitMessage
GetQueueStatus
TranslateMessage
RegisterClassExW
CallMsgFilterW
PeekMessageW
MsgWaitForMultipleObjectsEx
DispatchMessageW
CharUpperW
GetKeyState
IsWindowEnabled
FindWindowW
SystemParametersInfoW
IsWindow
GetSystemMetrics
PostMessageW
gdi32
DeleteObject
GetDeviceCaps
advapi32
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
SystemFunction036
RegNotifyChangeKeyValue
RegEnumValueW
ConvertSidToStringSidW
RegDeleteValueW
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegOpenCurrentUser
RegCloseKey
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
FreeSid
EqualSid
DuplicateToken
AllocateAndInitializeSid
AddAccessAllowedAce
AccessCheck
LookupPrivilegeValueW
RevertToSelf
ImpersonateSelf
AdjustTokenPrivileges
OpenThreadToken
SetThreadToken
ConvertStringSidToSidW
LookupAccountSidW
SetTokenInformation
GetTokenInformation
DuplicateTokenEx
OpenProcessToken
CreateProcessAsUserW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
IsValidSid
InitializeSid
InitializeAcl
GetSidSubAuthority
GetSidLengthRequired
GetLengthSid
GetAclInformation
GetAce
CopySid
AddAce
RegisterTraceGuidsW
shell32
ShellExecuteW
SHFileOperationW
ShellExecuteExW
SHGetFolderPathA
SHGetFolderPathW
SHGetKnownFolderPath
CommandLineToArgvW
SHGetSpecialFolderPathW
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
PropVariantClear
oleaut32
SysAllocString
SysFreeString
VarUI4FromStr
VariantClear
SysStringLen
shlwapi
SHSetValueW
ord176
StrToIntW
SHStrDupW
StrChrW
SHGetValueW
StrCmpNW
StrCmpNIW
StrRChrW
StrCmpIW
StrCpyNW
PathRemoveFileSpecW
PathIsDirectoryW
PathGetDriveNumberW
PathFindExtensionW
PathAddBackslashW
PathFileExistsW
PathAppendW
comctl32
InitCommonControlsEx
userenv
LoadUserProfileW
UnloadUserProfile
CreateEnvironmentBlock
DestroyEnvironmentBlock
mpr
WNetGetResourceInformationW
psapi
GetProcessMemoryInfo
EnumProcessModules
GetModuleFileNameExW
GetProcessImageFileNameW
GetMappedFileNameW
QueryWorkingSet
EnumProcesses
netapi32
NetApiBufferFree
NetGetJoinInformation
winmm
timeGetTime
timeBeginPeriod
timeEndPeriod
Exports
Exports
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 604KB - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE