Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
General
-
Target
file
-
Size
2.8MB
-
MD5
7f43199533320db39934f6f4bb41ddb5
-
SHA1
a48830c5f6fb68b1597f04946cc75592ce602164
-
SHA256
3fab8343541f4395f58ce2c9a17c51e1b1691926ca4a5e1eea17c0569aa20e95
-
SHA512
b62aba4d6f9c105779d64ab15ba59f6bbdf403a4fac183c84ce4eef810f054341c9329f5f4d9dc8827c9a147c81e97949e71b6426bb4b85dc612a06929bbacd8
-
SSDEEP
49152:aGtlqyIU6iH9VwASO6R7HcLpHzhBWMDVBSi+CZJfy+3dllqtabvFSL7TbCAUzdPG:++4t8Lpjj+s+8IHTeAUzXy9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource file
Files
-
file.exe windows:5 windows x64 arch:x64
f5f1c5c9a477a1013cd19fd5f908f4ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WaitForSingleObject
ReleaseMutex
CreateFileW
GetProcAddress
Sleep
GetExitCodeProcess
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcessId
OpenProcess
QueryFullProcessImageNameW
LocalFree
FormatMessageA
GetCurrentDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
SetEndOfFile
SetFileInformationByHandle
SetFilePointerEx
AreFileApisANSI
GetFileInformationByHandleEx
QueryPerformanceCounter
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
LCMapStringEx
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
WakeAllConditionVariable
GetSystemTimeAsFileTime
GetModuleHandleW
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
GetCurrentThreadId
InitializeSListHead
RtlPcToFileHeader
RaiseException
RtlUnwindEx
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
HeapAlloc
HeapFree
GetFileType
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
ReadConsoleW
GetTimeZoneInformation
HeapReAlloc
SetConsoleCtrlHandler
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
HeapSize
WriteConsoleW
GetModuleFileNameW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetDriveTypeW
RtlUnwind
FindFirstFileW
LoadLibraryW
LoadLibraryA
ReadConsoleA
SetConsoleMode
ConvertFiberToThread
CreateMutexA
GetLastError
CloseHandle
DeleteFiber
GetEnvironmentVariableW
shell32
CommandLineToArgvW
ShellExecuteExW
ole32
CoInitializeEx
CoUninitialize
wintrust
WinVerifyTrust
crypt32
CryptMsgClose
CryptMsgGetParam
CertCloseStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
CertGetCertificateContextProperty
CertOpenStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
CertFindCertificateInStore
ws2_32
recv
WSAGetLastError
WSACleanup
send
closesocket
WSASetLastError
bcrypt
BCryptGenRandom
user32
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
advapi32
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptExportKey
CryptDecrypt
CryptCreateHash
CryptDestroyHash
CryptSignHashW
CryptEnumProvidersW
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 622KB - Virtual size: 622KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ