Static task
static1
Behavioral task
behavioral1
Sample
23e10a74f4c6393bfbbee94e8cb69735782043eb9dce9510dc64065dc285820d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23e10a74f4c6393bfbbee94e8cb69735782043eb9dce9510dc64065dc285820d.exe
Resource
win10v2004-20240226-en
General
-
Target
23e10a74f4c6393bfbbee94e8cb69735782043eb9dce9510dc64065dc285820d.exe
-
Size
39KB
-
MD5
cdb007d99d10f9c955f3c59a00c89e1c
-
SHA1
fba8db6ece8fa7f0d14b7b1e97255d92f4e897fe
-
SHA256
23e10a74f4c6393bfbbee94e8cb69735782043eb9dce9510dc64065dc285820d
-
SHA512
97fee7136b2d2803c5e19fd63369b2566e13d12327ac40151126121bfb80f6dcaa8dd1ad63ace55fedc9f879b45b92cb1a5cfe129587d39a14db4d08e9cefa95
-
SSDEEP
768:xIke6/0HZZ82VWMNwAo0quKsga5B1h9Yu40heyahE8rNtQJLUs2kk+UCUrEbM4:xy6cHv82PxquKsd1h9V9MNtQl3ri
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23e10a74f4c6393bfbbee94e8cb69735782043eb9dce9510dc64065dc285820d.exe
Files
-
23e10a74f4c6393bfbbee94e8cb69735782043eb9dce9510dc64065dc285820d.exe.exe windows:6 windows x86 arch:x86
1bdca2933877654a3139987e7f8bcb4c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetConnectW
InternetCloseHandle
HttpSendRequestW
InternetCrackUrlW
InternetOpenW
InternetReadFile
HttpOpenRequestW
InternetQueryDataAvailable
InternetQueryOptionW
InternetSetOptionW
shlwapi
wnsprintfW
StrStrW
StrToIntA
StrCmpNIA
PathCombineW
StrStrIW
wnsprintfA
urlmon
ObtainUserAgentString
ntdll
RtlInitUnicodeString
NtClose
NtQueryInformationProcess
ws2_32
closesocket
select
send
inet_pton
WSAStartup
htons
recv
connect
socket
kernel32
GetSystemDirectoryW
GetModuleHandleA
SetFileAttributesW
MultiByteToWideChar
FindClose
CreateMutexW
GetFileAttributesW
GetUserDefaultLangID
lstrcmpW
lstrcpyW
GlobalMemoryStatusEx
GetComputerNameW
ExitProcess
CreateThread
GetLastError
GetTickCount64
Sleep
GetTickCount
ReadFile
WriteFile
GetTempPathW
CreateFileW
GetFileAttributesExW
DeleteFileW
CloseHandle
GetFileSize
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
WriteProcessMemory
GetCurrentProcess
CreatePipe
SetFilePointer
SetEndOfFile
PeekNamedPipe
WaitForSingleObject
lstrcmpA
ResumeThread
LoadLibraryA
VirtualProtectEx
GetThreadContext
GetProcAddress
VirtualAllocEx
ReadProcessMemory
CreateProcessW
GetModuleHandleW
SetThreadContext
FlushFileBuffers
InitializeCriticalSection
GetVolumeInformationW
FindFirstFileW
EnterCriticalSection
FindNextFileW
lstrlenW
ExpandEnvironmentStringsW
GetModuleFileNameW
LeaveCriticalSection
GetSystemWow64DirectoryW
user32
EnumDisplayDevicesW
wsprintfA
advapi32
RegCloseKey
CryptAcquireContextA
OpenProcessToken
LsaFreeMemory
LsaQueryInformationPolicy
LsaOpenPolicy
LsaClose
GetUserNameW
InitiateSystemShutdownExW
CryptGenRandom
RegOpenKeyExW
RegQueryValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
shell32
SHGetFolderPathW
ShellExecuteW
ole32
CoInitializeEx
StringFromGUID2
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantClear
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ