Static task
static1
Behavioral task
behavioral1
Sample
9f2d9f3fcbb5b89162d97dfae7b0810145ca95dc7ad142d4390d93be2b8fcefc.exe
Resource
win7-20240221-en
General
-
Target
9f2d9f3fcbb5b89162d97dfae7b0810145ca95dc7ad142d4390d93be2b8fcefc
-
Size
528KB
-
MD5
6ce3d1dacd7d1b702c14db474f7d1401
-
SHA1
c14744d102b6758b5a5537822d9b052338679a1b
-
SHA256
9f2d9f3fcbb5b89162d97dfae7b0810145ca95dc7ad142d4390d93be2b8fcefc
-
SHA512
aa38b210d8c872c0b9e94c1d88ace34bd9b75ce37096ebb9df627a23800ba6b9391ab26973352ee797a5115f95b821cd617bdf7ae130b379a8eac27baa2e8ae7
-
SSDEEP
12288:cyd3AGEcsZ2717jz9IgCrB4ur7ud0qyOG7vRRb:RwXZcjz94riuOd1yBL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9f2d9f3fcbb5b89162d97dfae7b0810145ca95dc7ad142d4390d93be2b8fcefc
Files
-
9f2d9f3fcbb5b89162d97dfae7b0810145ca95dc7ad142d4390d93be2b8fcefc.exe windows:5 windows x86 arch:x86
9b0ec1795cfba04d39290d9b6cac2b7f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
FindResourceA
FreeLibrary
LoadResource
UpdateResourceA
EndUpdateResourceW
EnumResourceTypesA
SizeofResource
EnumResourceLanguagesA
SetLastError
BeginUpdateResourceW
LoadLibraryA
LockResource
BeginUpdateResourceA
UpdateResourceW
EnumResourceNamesA
EndUpdateResourceA
WideCharToMultiByte
MultiByteToWideChar
CreateProcessW
GetCurrentProcess
GetModuleHandleW
OpenProcess
WaitForSingleObject
GetVersionExW
TerminateProcess
CreateDirectoryA
GetProcAddress
Process32FirstW
GetSystemInfo
GetModuleFileNameA
Process32NextW
CreateToolhelp32Snapshot
CreateProcessA
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
GetExitCodeProcess
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateMutexW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateThread
Sleep
DeleteFileA
FindNextFileW
FindClose
RemoveDirectoryA
GetFileAttributesA
FindFirstFileW
DeleteFileW
CloseHandle
GetLastError
CreateFileW
ReadFile
WriteFile
SetFilePointer
GetFileSize
LoadLibraryW
CreateFileA
GetProcessHeap
GetLocaleInfoW
HeapSize
SetConsoleCtrlHandler
FlushFileBuffers
FatalAppExitA
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetACP
GetConsoleMode
GetConsoleCP
SetStdHandle
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapDestroy
HeapCreate
GetCurrentThread
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStartupInfoW
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InterlockedExchange
InterlockedCompareExchange
GetCommandLineW
HeapSetInformation
MoveFileA
HeapFree
GetSystemTimeAsFileTime
WriteConsoleW
GetFileType
GetStdHandle
GetModuleFileNameW
HeapAlloc
GetTimeFormatA
GetDateFormatA
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
SetUnhandledExceptionFilter
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
user32
FindWindowA
GetSystemMetrics
FindWindowExW
IsWindow
FindWindowW
GetWindowRect
PostMessageW
GetWindowThreadProcessId
GetWindowLongW
advapi32
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegDeleteTreeA
RegRestoreKeyA
RegCloseKey
AdjustTokenPrivileges
CheckTokenMembership
FreeSid
RegEnumValueA
AllocateAndInitializeSid
DuplicateTokenEx
RegOpenKeyExA
LookupPrivilegeValueW
CreateProcessWithTokenW
RegOpenKeyW
RegQueryValueExA
GetTokenInformation
OpenProcessToken
RegSaveKeyA
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
ShellExecuteExA
ShellExecuteA
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
psapi
GetModuleFileNameExA
imagehlp
MakeSureDirectoryPathExists
ws2_32
WSAStartup
connect
inet_ntoa
htons
recv
getsockopt
send
gethostbyname
closesocket
__WSAFDIsSet
select
socket
netapi32
Netbios
Sections
.text Size: 347KB - Virtual size: 347KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 88KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE