Resubmissions
03-01-2022 15:51
220103-tagh5sbdh2 10Static task
static1
Behavioral task
behavioral1
Sample
kr.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
kr.exe
Resource
win10-20240319-en
Behavioral task
behavioral3
Sample
kr.exe
Resource
win10v2004-20240412-en
General
-
Target
kr.exe
-
Size
786KB
-
MD5
899dc9cc6e7516536bf5e816e8cecf55
-
SHA1
6c07fc00ed2202798194749aa8037bb0ad38bb00
-
SHA256
5f84ad4413ad6dcdea0cb3aa206cc4df29e1bad9d9598912c323c931d568ac90
-
SHA512
445016f0e37ee3ecec319b73713d083711608c044f855e16268f89c88d460e95d85b79d375534ac6b7a4a0e869c49470d49b7e325ff0507c550107d593ae688c
-
SSDEEP
12288:vyxPJa2s86jofrWEuxjcZxyPq8tf8sQ+PRtj3lDsmMHj3N6eiaFmhL+JigR:vyxPJ/s86szWEuKiflOmMDhPEhL+lR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource kr.exe
Files
-
kr.exe.exe windows:5 windows x86 arch:x86
7ce5ed27d4bed277ca4562933102c47c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
GetACP
MultiByteToWideChar
FlushFileBuffers
GetFileSizeEx
GetLastError
VirtualAlloc
RemoveDirectoryA
SetStdHandle
GetLocalTime
QueryPerformanceFrequency
CloseHandle
GetCurrentProcessId
GetSystemTime
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetModuleFileNameW
ReadFile
GetProcessHeap
HeapSize
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetFilePointer
IsValidCodePage
GetOEMCP
GetCPInfo
CreateFileA
HeapReAlloc
VirtualFree
HeapCreate
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetFileAttributesA
CreateEventA
Sleep
IsValidLocale
WideCharToMultiByte
OpenProcess
GetProcessTimes
WriteFile
GetDateFormatA
GetTickCount
WaitForSingleObject
QueryPerformanceCounter
CompareFileTime
SystemTimeToFileTime
SetFilePointerEx
SystemTimeToTzSpecificLocalTime
SetEndOfFile
GetLocaleInfoA
GetFileSize
GetSystemDefaultLangID
DeleteCriticalSection
GetModuleFileNameA
GetStdHandle
GetConsoleMode
GetConsoleCP
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
user32
BeginPaint
GetShellWindow
CheckMenuItem
SetDlgItemTextA
GetCaretBlinkTime
GetDlgItemTextA
ClientToScreen
GetWindowRect
SendDlgItemMessageA
TrackPopupMenu
GetWindowDC
MsgWaitForMultipleObjects
GetSubMenu
FindWindowA
GetParent
InvalidateRgn
GetClipboardFormatNameA
GetClientRect
SendMessageA
SetMenuItemBitmaps
EnumWindows
GetDC
GetForegroundWindow
SetWindowContextHelpId
GetWindowTextA
TranslateAcceleratorA
SetWindowPos
IsDlgButtonChecked
SetMenuInfo
GetMenuItemCount
CheckRadioButton
GetSystemMetrics
UpdateWindow
gdi32
FloodFill
GetBkMode
DeleteDC
SetPixel
CreateBitmap
DeleteObject
SelectObject
CreateCompatibleDC
FillRgn
GetBkColor
GetPixel
GetObjectA
GetStockObject
BitBlt
advapi32
RegCloseKey
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
shell32
SHBindToParent
SHGetFolderLocation
SHGetFolderPathW
ole32
CoTaskMemFree
CoInitialize
CoCreateInstance
StringFromCLSID
oleaut32
LoadTypeLi
VariantInit
SysAllocStringLen
VariantChangeType
winmm
timeGetTime
shlwapi
PathAppendW
Sections
.text Size: 210KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 518KB - Virtual size: 518KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ