Static task
static1
Behavioral task
behavioral1
Sample
272cfaebf22e0f6a34c0a93b7c9c5b67c725947ba0f17e60ed67dbf6e1602043.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
272cfaebf22e0f6a34c0a93b7c9c5b67c725947ba0f17e60ed67dbf6e1602043.dll
Resource
win10v2004-20240412-en
General
-
Target
272cfaebf22e0f6a34c0a93b7c9c5b67c725947ba0f17e60ed67dbf6e1602043.exe
-
Size
162KB
-
MD5
2bebf05a9607f038f5407248fb075cd6
-
SHA1
97e0e161d673925e42cdf04763e7eaa53035338b
-
SHA256
272cfaebf22e0f6a34c0a93b7c9c5b67c725947ba0f17e60ed67dbf6e1602043
-
SHA512
ce4074fc53803b2cff8b6436635f4437d3287919776dfa05c0d18df582ee0fc75719640b5630f915bc69add15e5bb2cf7d2948c83b74ee09e3e99749f372398e
-
SSDEEP
3072:QTjEKhix6W/osphXpzzLCZTXJy4Sky8g/TcI/BhQGv1eAgo:RKhix6KogzsT5Uky8gthQYp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 272cfaebf22e0f6a34c0a93b7c9c5b67c725947ba0f17e60ed67dbf6e1602043.exe
Files
-
272cfaebf22e0f6a34c0a93b7c9c5b67c725947ba0f17e60ed67dbf6e1602043.exe.dll windows:6 windows x64 arch:x64
46527d695d46dffa239ac10f96a234a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
CreateThread
MoveFileExW
SetEvent
CreateEventW
WaitForMultipleObjects
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
HeapValidate
MultiByteToWideChar
WideCharToMultiByte
TerminateThread
GetExitCodeThread
SuspendThread
ResumeThread
ExitProcess
GetNativeSystemInfo
GetModuleFileNameW
GetModuleHandleExW
WaitForSingleObject
OpenMutexW
SetWaitableTimer
CreateWaitableTimerW
SetProcessShutdownParameters
GetTempPathW
ExpandEnvironmentStringsW
CompareFileTime
DuplicateHandle
SetHandleInformation
CreatePipe
PeekNamedPipe
GetProcessTimes
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetProcessId
OpenProcess
LocalFree
lstrcmpiW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ResetEvent
GetSystemTimeAsFileTime
GetVersionExW
GetLocaleInfoW
GetModuleHandleW
lstrcmpW
SetFilePointerEx
SetFileAttributesW
ReadFile
GetTempFileNameW
GetShortPathNameW
GetFileSizeEx
GetFileAttributesW
FindFirstFileW
FindClose
LoadLibraryA
GetProcAddress
FreeLibrary
WaitForMultipleObjectsEx
WaitForSingleObjectEx
SleepEx
GetLastError
CloseHandle
WriteFile
DeleteFileW
GetProcessShutdownParameters
CreateFileW
user32
GetSystemMetrics
CreateWindowExW
GetMessageW
TranslateMessage
DispatchMessageW
DefWindowProcW
UnregisterClassW
DestroyWindow
GetWindowLongPtrW
IsCharAlphaNumericA
SetWindowLongPtrW
wsprintfW
GetLastInputInfo
RegisterClassExW
advapi32
CryptImportKey
CryptGenRandom
CryptGenKey
CryptAcquireContextW
CryptEncrypt
CryptDecrypt
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
GetCurrentHwProfileW
OpenProcessToken
GetTokenInformation
GetUserNameW
RegCreateKeyExW
shell32
CommandLineToArgvW
SHCreateDirectoryExW
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
StringFromGUID2
oleaut32
VariantClear
VariantInit
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SysFreeString
SysAllocString
shlwapi
StrStrNIW
PathRemoveFileSpecW
StrToIntW
SHDeleteKeyW
netapi32
NetApiBufferFree
NetWkstaGetInfo
NetUserGetInfo
winhttp
WinHttpGetIEProxyConfigForCurrentUser
crypt32
CryptStringToBinaryW
CryptImportPublicKeyInfo
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 196B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ