Static task
static1
Behavioral task
behavioral1
Sample
f30b9f6e913798ca52154c88725ee262a7bf92fe7caac1ae2e5147e457b9b08a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f30b9f6e913798ca52154c88725ee262a7bf92fe7caac1ae2e5147e457b9b08a.dll
Resource
win10v2004-20240226-en
General
-
Target
f30b9f6e913798ca52154c88725ee262a7bf92fe7caac1ae2e5147e457b9b08a.exe
-
Size
112KB
-
MD5
5294aaf2ff80547172ebb9e0bcb52e0f
-
SHA1
9bbde40cab30916b42e59208fbcc09affef525c1
-
SHA256
f30b9f6e913798ca52154c88725ee262a7bf92fe7caac1ae2e5147e457b9b08a
-
SHA512
3144f35d991919ed6e81f7dcd9eaf10ac4cda2a0cf98ec0783952d69ac191c2e7b31b013b376911d8f5fd92af705c34264427ba091317123fe580383388a943e
-
SSDEEP
3072:qz5whrkrtKfcuWp05oWunbBm8CRa+pnH:rrkrtRZ3NmTnH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f30b9f6e913798ca52154c88725ee262a7bf92fe7caac1ae2e5147e457b9b08a.exe
Files
-
f30b9f6e913798ca52154c88725ee262a7bf92fe7caac1ae2e5147e457b9b08a.exe.dll windows:5 windows x64 arch:x64
9953472df0cd811a6d9a53885ecaaf21
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
HeapReAlloc
HeapFree
HeapSize
HeapValidate
GetProcessHeap
VirtualFree
VirtualProtect
MultiByteToWideChar
WideCharToMultiByte
CreateThread
TerminateThread
GetExitCodeThread
SuspendThread
ResumeThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ExitProcess
GetNativeSystemInfo
GetModuleFileNameW
GetModuleHandleExW
CreateMutexW
OpenMutexW
CreateWaitableTimerW
CreateEventW
SetProcessShutdownParameters
GetProcessShutdownParameters
LocalFree
GetProcessTimes
OpenProcess
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
GetProcessId
DuplicateHandle
SetHandleInformation
CompareFileTime
CreatePipe
PeekNamedPipe
lstrcmpiW
CreateProcessW
ExpandEnvironmentStringsW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
ResetEvent
GetSystemTimeAsFileTime
GetVersionExW
GetLocaleInfoW
GetModuleHandleW
lstrcmpW
HeapAlloc
WaitForMultipleObjects
WaitForSingleObject
MoveFileExW
SetEvent
FindFirstFileW
GetFileAttributesW
SetFileAttributesW
GetTempFileNameW
GetTempPathW
FindClose
SetFilePointerEx
ReadFile
GetFileSizeEx
Sleep
GetShortPathNameW
WaitForMultipleObjectsEx
WaitForSingleObjectEx
SleepEx
GetLastError
DeleteFileW
CreateFileW
CloseHandle
SetWaitableTimer
WriteFile
user32
SetWindowLongPtrW
TranslateMessage
DefWindowProcW
UnregisterClassW
RegisterClassExW
CreateWindowExW
OemToCharA
GetMessageW
IsCharAlphaNumericA
wsprintfW
DispatchMessageW
GetSystemMetrics
DestroyWindow
GetWindowLongPtrW
GetLastInputInfo
advapi32
CryptDecrypt
CryptImportKey
CryptGenRandom
CryptDestroyKey
CryptGenKey
CryptReleaseContext
CryptAcquireContextW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
GetCurrentHwProfileW
OpenProcessToken
GetTokenInformation
GetUserNameW
RegCreateKeyExW
RegSetValueExW
CryptEncrypt
shell32
CommandLineToArgvW
SHCreateDirectoryExW
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
VariantClear
SafeArrayAccessData
SafeArrayCreate
SysAllocString
SysFreeString
SafeArrayUnaccessData
VariantInit
shlwapi
StrStrNIW
PathRemoveFileSpecW
StrToIntW
SHDeleteKeyW
netapi32
NetWkstaGetInfo
NetUserGetInfo
NetApiBufferFree
crypt32
CryptImportPublicKeyInfo
CryptStringToBinaryW
CryptDecodeObjectEx
ws2_32
htonl
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ