Static task
static1
Behavioral task
behavioral1
Sample
886e7271b1a0b0b6c8b2a180c2f34b1d08d899b1e4f806037a3c15feee604d7b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
886e7271b1a0b0b6c8b2a180c2f34b1d08d899b1e4f806037a3c15feee604d7b.exe
Resource
win10v2004-20231215-en
General
-
Target
886e7271b1a0b0b6c8b2a180c2f34b1d08d899b1e4f806037a3c15feee604d7b
-
Size
248KB
-
MD5
202ab67a403f42ae9a6f099871118a5d
-
SHA1
b287a5e914330e457ee8b69840e1dd16db317662
-
SHA256
886e7271b1a0b0b6c8b2a180c2f34b1d08d899b1e4f806037a3c15feee604d7b
-
SHA512
1d1a9a04dae53a7a1d176845b2c4f2fa4cf3219aca38020310af8238c02daa8443d1f3d716b948e34c3375987843a3e800aa17d6e37c05ae90ae92f8865ef838
-
SSDEEP
6144:UKJD3G7gqTAUOgM0MM0KsGGT4M0MMlFAX:zw7gqij
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 886e7271b1a0b0b6c8b2a180c2f34b1d08d899b1e4f806037a3c15feee604d7b
Files
-
886e7271b1a0b0b6c8b2a180c2f34b1d08d899b1e4f806037a3c15feee604d7b.exe windows:5 windows x86 arch:x86
56164177703e080c7a71fee7fdafb455
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
NetApiBufferFree
NetApiBufferAllocate
NetRemoteTOD
NetScheduleJobDel
ws2_32
htons
inet_ntoa
gethostbyname
WSAStartup
WSACleanup
gethostname
iphlpapi
GetExtendedTcpTable
kernel32
VirtualAlloc
LocalFree
Sleep
LocalAlloc
GetLastError
DeleteFileW
TerminateProcess
MoveFileExW
GetProcAddress
GetModuleHandleW
GetFileSizeEx
CreateFileW
WriteFile
SizeofResource
LockResource
LoadResource
FindResourceW
GetCommandLineW
GetFileTime
OpenProcess
GetTickCount
VirtualFree
CreateThread
CreateProcessW
CopyFileW
MoveFileW
WaitForSingleObject
LeaveCriticalSection
EndUpdateResourceW
UpdateResourceW
BeginUpdateResourceW
ReadFile
GetFileSize
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapSize
HeapReAlloc
GetLocaleInfoW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CloseHandle
SetFileTime
GetCurrentProcess
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetProcessHeap
LoadLibraryW
WriteConsoleW
SetStdHandle
CreateFileA
SetEndOfFile
GetWindowsDirectoryW
GetStringTypeW
IsValidCodePage
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
RaiseException
RtlUnwind
HeapFree
HeapSetInformation
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
HeapAlloc
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
ExitProcess
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
user32
LoadImageW
wsprintfW
advapi32
OpenSCManagerW
RegisterServiceCtrlHandlerW
SetServiceStatus
StartServiceCtrlDispatcherW
ControlService
QueryServiceStatus
DeleteService
OpenServiceW
QueryServiceConfigW
ChangeServiceConfigW
CloseServiceHandle
CreateServiceW
ChangeServiceConfig2W
StartServiceW
CreateProcessAsUserW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
shell32
CommandLineToArgvW
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ