Static task
static1
Behavioral task
behavioral1
Sample
713ac487d166eacb2c398af18ed92388.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
713ac487d166eacb2c398af18ed92388.exe
Resource
win10v2004-20231215-en
General
-
Target
713ac487d166eacb2c398af18ed92388
-
Size
3.6MB
-
MD5
713ac487d166eacb2c398af18ed92388
-
SHA1
cdff976e90519aa9fe9cfed31df3283dbf9be67a
-
SHA256
7a19f2a32db929ce46fe0bcc1111748ee85fef98db152c2c7dfc1dcc336adef2
-
SHA512
94634291af6fcbe0a2863803e131e2d357306ad317e70c73a2eaea86cee8d2e38fb77a12a00058cc8cdf165252a83059828f6cbe8c56e2b9481fdda09ed93e4a
-
SSDEEP
49152:NGtlqhiIU6ibkDDs4OIQC3w3ydWGNGKDyfkBU8ysxWn0ni4JnaM2MlUBtnvWWiPa:r+bZydWGNhEkxKGRlU7XLmMkLu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 713ac487d166eacb2c398af18ed92388
Files
-
713ac487d166eacb2c398af18ed92388.exe windows:6 windows x64 arch:x64
2852dd746bc8328c4e6435504766b9b5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetProcAddress
LocalFree
GetFileSize
DeleteCriticalSection
GetProcessHeap
FreeLibrary
GetConsoleWindow
lstrcmpiW
GetWindowsDirectoryW
HeapDestroy
DecodePointer
HeapAlloc
LoadLibraryW
RaiseException
HeapReAlloc
DeleteFileW
LoadLibraryA
GetLastError
SetConsoleScreenBufferInfoEx
GetConsoleMode
Sleep
HeapSize
GetConsoleScreenBufferInfoEx
InitializeCriticalSectionEx
LoadLibraryExA
VirtualAlloc
SetConsoleMode
WriteFile
GetStdHandle
GetCurrentProcess
SetConsoleTitleA
VirtualFree
SetConsoleTextAttribute
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FlushFileBuffers
SetStdHandle
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetConsoleOutputCP
GetCommandLineW
GetCommandLineA
GetModuleFileNameW
SetConsoleCtrlHandler
FreeLibraryAndExitThread
ExitThread
CreateThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
ExitProcess
VirtualQuery
VirtualProtect
GetSystemInfo
LoadLibraryExW
RtlPcToFileHeader
InterlockedPushEntrySList
RtlUnwindEx
OutputDebugStringW
GetCPInfo
GetStringTypeW
HeapFree
GetModuleFileNameA
ReadFile
CloseHandle
CreateFileW
DeviceIoControl
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
FormatMessageA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SleepEx
GetSystemDirectoryA
GetModuleHandleA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetFileType
PeekNamedPipe
WaitForMultipleObjects
CreateFileA
GetFileSizeEx
GetEnvironmentVariableW
WideCharToMultiByte
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
MultiByteToWideChar
FormatMessageW
GetModuleHandleW
GetCurrentProcessId
GetSystemTimeAsFileTime
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
SetEvent
ResetEvent
CreateEventW
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentDirectoryW
FindFirstFileExW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
SetEndOfFile
SetFileInformationByHandle
SetFilePointerEx
AreFileApisANSI
MoveFileExW
GetFileInformationByHandleEx
EncodePointer
LCMapStringEx
RtlUnwind
user32
GetWindowLongA
SetWindowLongA
PostThreadMessageA
MessageBoxA
MoveWindow
UnhookWindowsHookEx
FindWindowA
GetWindowThreadProcessId
SetWindowsHookExA
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
GetWindowRect
GetAsyncKeyState
advapi32
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDestroyHash
CryptHashData
GetTokenInformation
GetLengthSid
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
CryptGenRandom
CryptCreateHash
IsValidSid
ConvertSidToStringSidA
CopySid
OpenProcessToken
shell32
ShellExecuteW
ShellExecuteA
ws2_32
ioctlsocket
listen
htonl
freeaddrinfo
send
recv
closesocket
accept
WSACleanup
WSAStartup
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSASetLastError
select
__WSAFDIsSet
ntohl
recvfrom
sendto
inet_pton
WSAGetLastError
gethostname
getaddrinfo
socket
shutdown
getnameinfo
wldap32
ord26
ord22
ord41
ord50
ord32
ord60
ord211
ord46
ord143
ord301
ord33
ord35
ord27
ord79
ord30
ord45
ord200
crypt32
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
CertAddCertificateContextToStore
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertDuplicateCertificateContext
CertGetCertificateContextProperty
vmprotectsdk64
VMProtectBeginUltra
VMProtectIsDebuggerPresent
VMProtectEnd
userenv
UnloadUserProfile
rpcrt4
UuidCreate
RpcStringFreeA
UuidToStringA
ntdll
RtlCaptureContext
RtlImageNtHeader
VerSetConditionMask
RtlVirtualUnwind
RtlLookupFunctionEntry
urlmon
URLDownloadToFileA
bcrypt
BCryptGenRandom
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 799KB - Virtual size: 799KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 306KB - Virtual size: 334KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ