Static task
static1
Behavioral task
behavioral1
Sample
d7a6518fcbe2f5ff77ffe403bf1291c8bfaaad75d92d15f886ab37a70b9df278.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d7a6518fcbe2f5ff77ffe403bf1291c8bfaaad75d92d15f886ab37a70b9df278.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
gvtrg.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
gvtrg.exe
Resource
win10v2004-20231215-en
General
-
Target
d7a6518fcbe2f5ff77ffe403bf1291c8bfaaad75d92d15f886ab37a70b9df278.exe
-
Size
323KB
-
MD5
0ce9779dfc4cb8096d118e48dc390b01
-
SHA1
84a3b8246ac70e69a97c79228e78c4a268309b2a
-
SHA256
2aa09add727ea0122ffff0f3e5cd8d8be7928cf0b5d2dc6c6160eb739db46ea5
-
SHA512
9152e4c72a8df9e30e7867c47c3887f68cce8ed986305677e3efb5971fef0a7beb5cfc07885b2dfa1b176c5bcf0c8b201645acdda3f9295c68a88dbdfc696864
-
SSDEEP
6144:CB0aC4NEPZbw1ixFHNt5ArWaAKSGLNTT4Qu+e3CDol2h2:iCgEeUxFHsTAKSGlTaVCcZ
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource d7a6518fcbe2f5ff77ffe403bf1291c8bfaaad75d92d15f886ab37a70b9df278.exe unpack001/gvtrg.exe -
NSIS installer 2 IoCs
resource yara_rule sample nsis_installer_1 sample nsis_installer_2
Files
-
d7a6518fcbe2f5ff77ffe403bf1291c8bfaaad75d92d15f886ab37a70b9df278.exe.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
gvtrg.exe.exe windows:6 windows x86 arch:x86
564bcacae786416f84da16d9ec6493d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsW
PathFileExistsA
SHRegEnumUSKeyA
UrlUnescapeA
SHRegOpenUSKeyA
kernel32
HeapSize
SetFilePointerEx
GetStdHandle
SetStdHandle
GetCommandLineW
GetEnvironmentVariableW
SetEnvironmentVariableW
ExpandEnvironmentStringsW
SetCurrentDirectoryW
GetCurrentDirectoryW
SearchPathW
CreateFileW
FindClose
FindFirstFileW
GetFileAttributesW
GetFileSize
GetFullPathNameW
GetTempFileNameW
ReadFile
SetFilePointer
WriteFile
GetTempPathW
CloseHandle
DuplicateHandle
GetLastError
WaitForSingleObject
GetCurrentProcess
ExitProcess
GetExitCodeProcess
CreateProcessW
GetStartupInfoW
GetSystemDirectoryW
VirtualAlloc
GetModuleHandleW
LocalAlloc
LocalFree
FormatMessageW
lstrcmpiW
lstrcpynW
lstrcpyW
lstrcatW
lstrlenW
IsBadStringPtrW
GetDateFormatW
GetTimeFormatW
CompareStringW
MultiByteToWideChar
WideCharToMultiByte
EnumSystemCodePagesW
GetConsoleCP
GetConsoleOutputCP
ReadConsoleW
WriteConsoleW
FlushFileBuffers
SetConsoleTitleW
GetConsoleWindow
InterlockedFlushSList
GetFileSizeEx
SetConsoleCtrlHandler
GetProcessHeap
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
OutputDebugStringW
GetFileType
HeapAlloc
HeapFree
InterlockedPushEntrySList
TerminateProcess
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
SetLastError
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
GetCurrentThread
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetCommandLineA
GetModuleHandleExW
GetModuleFileNameW
RaiseException
EncodePointer
LoadLibraryExW
GetProcAddress
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetConsoleMode
GetConsoleScreenBufferInfo
DecodePointer
RtlUnwind
msi
ord82
ord126
ord137
ord72
ord8
ord20
ord161
ord168
rtutils
TracePrintfA
LogEventW
TraceDumpExW
LogErrorA
LogEventA
TraceDumpExA
mswsock
inet_network
SetServiceW
GetNameByTypeW
SetServiceA
mapi32
ord11
ord126
ord22
rpcrt4
RpcEpRegisterW
RpcAsyncCancelCall
NdrStubInitializeMarshall
NdrSimpleTypeMarshall
NdrRpcSsDefaultAllocate
NdrStubInitialize
ws2_32
setsockopt
WPUCompleteOverlappedRequest
accept
setupapi
SetupCopyErrorA
InstallHinfSectionA
SetupFreeSourceListA
SetupQueryFileLogA
SetupAddInstallSectionToDiskSpaceListW
SetupDiGetActualSectionToInstallW
SetupDiGetDeviceInstallParamsW
user32
CharUpperBuffW
ShowWindow
wsprintfW
IsCharAlphaNumericW
IsCharAlphaW
LoadStringW
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
shell32
SHGetFileInfoW
FindExecutableW
Sections
.text Size: 286KB - Virtual size: 285KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
hruxnhx.b
-
orreti.vd