Static task
static1
Behavioral task
behavioral1
Sample
example.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
example.exe
Resource
win10v2004-20240226-en
General
-
Target
example.exe
-
Size
3.3MB
-
MD5
d0221b600262dd8c54bb49e42050aa73
-
SHA1
fba444d6b09bb50ca3bb70e02329a8d623e8a443
-
SHA256
73be5e042d6f012065ab188f00d2e3a2f71b46db394feda968a6af942cbbc1c7
-
SHA512
192c558f6769980f035a235f0cb024784e9aa7e0037334d9b401f12b29bfa6ce80fa27cbada518fd19478b3422d8eceb1f471196b57fe08e5dedd14c5e7e3613
-
SSDEEP
49152:wGtlqQ2IU6ixN1hQVZb1bN95Rl/LJiTzXh7LI+1RY1u0abOke4XZbYZK0W9QiPXH:/+x/4bN95vTmRBJTYZoq8tS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource example.exe
Files
-
example.exe.exe windows:6 windows x64 arch:x64
3b3e9073e4f6d2091d3104b81f593e4b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
shutdown
__WSAFDIsSet
inet_pton
select
WSASetLastError
bind
getnameinfo
gethostname
sendto
recvfrom
ntohl
freeaddrinfo
getaddrinfo
ioctlsocket
listen
htonl
socket
send
recv
closesocket
accept
WSACleanup
WSAStartup
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
WSAGetLastError
wldap32
ord45
ord211
ord60
ord46
ord50
ord41
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord22
ord143
crypt32
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertAddCertificateContextToStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
advapi32
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
AdjustTokenPrivileges
ConvertSidToStringSidA
CloseServiceHandle
LookupPrivilegeValueA
OpenSCManagerA
CopySid
IsValidSid
OpenProcessToken
GetLengthSid
QueryServiceStatusEx
OpenServiceA
GetTokenInformation
kernel32
VirtualAlloc
VirtualProtect
RtlPcToFileHeader
VirtualQuery
ExitProcess
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateThread
ExitThread
FreeLibraryAndExitThread
SetFilePointerEx
SetConsoleCtrlHandler
GetCommandLineA
GetCommandLineW
GetConsoleOutputCP
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
CreateProcessW
GetFileAttributesExW
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
FlushFileBuffers
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEndOfFile
WriteConsoleW
LoadLibraryExW
VerifyVersionInfoA
GetModuleFileNameA
WriteProcessMemory
HeapFree
SetConsoleTitleA
GetCurrentProcess
TerminateProcess
GetModuleFileNameW
InitializeCriticalSectionEx
WaitForSingleObject
ResumeThread
OpenProcess
HeapSize
MultiByteToWideChar
Sleep
GetLastError
HeapReAlloc
CloseHandle
GetSystemInfo
HeapAlloc
K32EnumProcesses
DecodePointer
HeapDestroy
GetThreadContext
VirtualAllocEx
LocalFree
DeleteCriticalSection
ReadProcessMemory
GetCurrentProcessId
GetProcessHeap
WideCharToMultiByte
GetConsoleWindow
CreateProcessA
SetThreadContext
VirtualQueryEx
GetExitCodeProcess
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
FormatMessageA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SleepEx
VerSetConditionMask
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
RtlUnwind
WaitForSingleObjectEx
ExpandEnvironmentStringsA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
CreateFileA
GetFileSizeEx
GetEnvironmentVariableW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
FormatMessageW
WriteFile
GetModuleHandleW
GetSystemTimeAsFileTime
RtlVirtualUnwind
SwitchToFiber
DeleteFiber
CreateFiber
LoadLibraryW
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
InterlockedPushEntrySList
RtlUnwindEx
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
SleepConditionVariableSRW
WakeAllConditionVariable
RaiseException
OutputDebugStringW
IsDebuggerPresent
GetCPInfo
GetStringTypeW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EncodePointer
LCMapStringEx
user32
MessageBoxW
MessageBoxA
GetSystemMenu
GetProcessWindowStation
GetUserObjectInformationW
EnableMenuItem
shell32
ShellExecuteA
bcrypt
BCryptGenRandom
userenv
UnloadUserProfile
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 785KB - Virtual size: 784KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ