Static task
static1
Behavioral task
behavioral1
Sample
76d23f1602a951907aba5e7e64e062b9203a42d417095959873d87b24b5f6467.exe
Resource
win7-20240221-en
General
-
Target
76d23f1602a951907aba5e7e64e062b9203a42d417095959873d87b24b5f6467
-
Size
2.8MB
-
MD5
62727ba33f6c94ffe7ba3aa681655393
-
SHA1
e8a3781e5ad6bab6b742161141d2a40043456456
-
SHA256
76d23f1602a951907aba5e7e64e062b9203a42d417095959873d87b24b5f6467
-
SHA512
e9d58e2a815e76136cef4e5fa347d368803a7fd3e2876c24064075aa2796ddc2fa4fe7914a56d56a01b658cb9a1d68215052a4dd21c11ac213fc3ee974af3d26
-
SSDEEP
49152:pshlCX2r1xh+lcpWkHVrcWTfx8LB0Pz20vgcpNZku7ljZMSUjffJ:psHCXe1xclcJHViytvenJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76d23f1602a951907aba5e7e64e062b9203a42d417095959873d87b24b5f6467
Files
-
76d23f1602a951907aba5e7e64e062b9203a42d417095959873d87b24b5f6467.exe windows:5 windows x86 arch:x86
344880c938d7291a5662f82c736792b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
InterlockedDecrement
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
GetLastError
RaiseException
LoadResource
FindResourceW
DecodePointer
GetModuleHandleW
InterlockedIncrement
lstrcmpiW
LoadLibraryExW
MapViewOfFile
FlushViewOfFile
UnmapViewOfFile
OpenFileMappingW
IsBadReadPtr
GetProcessHeap
HeapAlloc
GetNativeSystemInfo
LoadLibraryA
VirtualAlloc
lstrlenW
VirtualFree
SetLastError
HeapFree
VirtualProtect
GetPrivateProfileStringW
WritePrivateProfileStringW
GetCurrentProcessId
GetFullPathNameW
GetCurrentDirectoryW
FreeLibraryAndExitThread
ExitThread
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
SystemTimeToFileTime
GetSystemTime
ReadConsoleA
SetConsoleMode
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
VerifyVersionInfoA
GetSystemDirectoryA
GetVersionExW
LocalAlloc
LocalFree
GetCurrentProcess
OutputDebugStringW
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetLongPathNameW
GetExitCodeProcess
WriteFile
GetTickCount
GetTempPathW
GetFileAttributesW
FreeLibrary
HeapReAlloc
HeapSize
GetFileSize
ReadFile
WideCharToMultiByte
GetPrivateProfileIntW
GlobalAlloc
DeleteCriticalSection
ReadProcessMemory
lstrcpyW
CreateProcessW
FindClose
GetEnvironmentVariableW
CreateDirectoryW
RemoveDirectoryW
FindFirstFileW
FindNextFileW
MoveFileExW
GetSystemInfo
FileTimeToSystemTime
ReleaseMutex
CreateMutexW
GetVolumeInformationW
OutputDebugStringA
SetPriorityClass
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetStringTypeW
GetFileType
WriteConsoleW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
SetStdHandle
GetConsoleCP
FlushFileBuffers
SetEndOfFile
GetModuleHandleA
VerSetConditionMask
ExpandEnvironmentStringsA
PeekNamedPipe
WaitForMultipleObjects
SleepEx
FormatMessageA
SwitchToThread
CreateThread
SetEvent
CreateEventW
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
GlobalFree
EnterCriticalSection
GetProcAddress
LoadLibraryW
CloseHandle
Process32FirstW
DeleteFileW
Process32NextW
Sleep
CreateToolhelp32Snapshot
OpenProcess
GetSystemDirectoryW
CreateFileW
CopyFileW
DeviceIoControl
user32
FindWindowW
PostMessageW
CharNextW
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
wsprintfW
LoadStringW
advapi32
ReportEventW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetTokenInformation
LookupAccountSidW
GetTokenInformation
RevertToSelf
ImpersonateLoggedOnUser
DuplicateTokenEx
RegQueryInfoKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegCloseKey
RegEnumKeyW
RegDeleteKeyW
OpenProcessToken
RegOpenKeyExW
CreateProcessAsUserW
RegOpenKeyW
RegQueryValueExW
CryptAcquireContextW
CryptReleaseContext
CryptGenRandom
DeregisterEventSource
RegisterEventSourceW
shell32
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetFolderPathW
SHChangeNotify
ole32
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoUninitialize
oleaut32
VarUI4FromStr
shlwapi
PathFileExistsW
SHDeleteKeyW
SHDeleteValueW
SHGetValueW
SHSetValueW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
wininet
InternetSetOptionW
InternetReadFile
InternetOpenUrlW
InternetQueryOptionW
HttpQueryInfoW
InternetOpenW
InternetCloseHandle
wldap32
ord50
ord143
ord200
ord41
ord22
ord60
ord27
ord32
ord33
ord35
ord79
ord30
ord26
ord46
ord211
ord301
ws2_32
gethostname
ioctlsocket
listen
accept
sendto
recvfrom
freeaddrinfo
getaddrinfo
__WSAFDIsSet
WSAStartup
WSAIoctl
socket
setsockopt
ntohs
htons
getsockopt
WSACleanup
bind
recv
send
WSAGetLastError
select
getsockname
getpeername
connect
closesocket
WSASetLastError
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 540KB - Virtual size: 540KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 425KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE