Static task
static1
Behavioral task
behavioral1
Sample
41a5aa969b7fcd48ebe1df8f2183c80f183880971eb9ee944e138fe93f9908c2.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
41a5aa969b7fcd48ebe1df8f2183c80f183880971eb9ee944e138fe93f9908c2.exe
Resource
win10v2004-20240221-en
General
-
Target
41a5aa969b7fcd48ebe1df8f2183c80f183880971eb9ee944e138fe93f9908c2
-
Size
756KB
-
MD5
f80d6ed0789610f201cd6e43b6fbba6a
-
SHA1
6851d5e2b7d68b8428e05660f02a20a4ca43490c
-
SHA256
41a5aa969b7fcd48ebe1df8f2183c80f183880971eb9ee944e138fe93f9908c2
-
SHA512
139994477ac7f43181c6ac1a80a5803204ac23365b33ee55e746a2a03cfed4151ba4646d099a30b0a214f6970403c739df608629449c2273b345d6c3b8ebd5b2
-
SSDEEP
12288:Ma+VB3ed8nqDaQzzQ2sfCyXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3m:ZUesqBRsfCysqjnhMgeiCl7G0nehbGZd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41a5aa969b7fcd48ebe1df8f2183c80f183880971eb9ee944e138fe93f9908c2
Files
-
41a5aa969b7fcd48ebe1df8f2183c80f183880971eb9ee944e138fe93f9908c2.exe windows:6 windows x86 arch:x86
45d907ffed62d66ba8423dbfa28527ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
CM_Get_Parent
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInstanceIdA
SetupDiGetClassDevsA
shlwapi
PathFileExistsA
PathFileExistsW
PathAppendA
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
kernel32
GetCurrentProcess
SetLastError
CreateProcessA
LoadLibraryA
Sleep
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
VerSetConditionMask
VerifyVersionInfoA
GetFileAttributesW
SetFileAttributesW
DeleteFileW
FindNextFileW
FindClose
CreateDirectoryA
GetLogicalDriveStringsA
GetDriveTypeA
lstrcmpiA
OutputDebugStringA
GetCommandLineA
GetCommandLineW
LocalFree
FindFirstFileA
CreateSemaphoreA
GetProcessHeap
GetFileSize
GetFileAttributesA
SetFileAttributesA
DeleteFileA
TerminateProcess
GetCurrentProcessId
LocalAlloc
SetConsoleCtrlHandler
GetCurrentThreadId
CreateEventA
CreateThread
SetEvent
GetTickCount
WaitForMultipleObjects
ResetEvent
GetLocalTime
GetTempPathA
GetPrivateProfileStringA
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
GetTimeZoneInformation
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapSize
HeapReAlloc
HeapFree
VirtualQuery
HeapAlloc
FreeLibrary
GetModuleFileNameA
WaitForSingleObject
CreateFileA
CloseHandle
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
DecodePointer
GetProcAddress
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
SetStdHandle
GetStringTypeW
GetFileSizeEx
SetFilePointerEx
CreateFileW
ReadFile
ReadConsoleW
SetEndOfFile
WriteConsoleW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
GetCPInfo
GetFileType
LCMapStringW
CompareStringW
VirtualProtect
VirtualAlloc
GetSystemInfo
LoadLibraryExW
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
WriteFile
user32
RegisterDeviceNotificationA
GetMessageA
DispatchMessageA
CharNextA
UnregisterDeviceNotification
PostThreadMessageA
advapi32
GetTokenInformation
RegCreateKeyExA
GetUserNameA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
QueryServiceStatus
UnlockServiceDatabase
ChangeServiceConfigA
QueryServiceLockStatusA
LockServiceDatabase
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerExA
SetServiceStatus
CloseServiceHandle
DeleteService
ControlService
StartServiceA
ChangeServiceConfig2A
CreateServiceA
QueryServiceConfigA
OpenServiceA
OpenSCManagerA
CreateProcessAsUserA
OpenProcessToken
ConvertStringSecurityDescriptorToSecurityDescriptorA
ole32
CoInitialize
CoCreateInstance
shell32
SHGetFolderPathA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
CommandLineToArgvW
oleaut32
SysFreeString
SysAllocStringLen
SysAllocString
VariantClear
Sections
.text Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE