Static task
static1
Behavioral task
behavioral1
Sample
582f9e1f97072a8361bb0fe1eeee08bc026d31ba069e4e1020a9cbe03dc2f01a.exe
Resource
win7-20231129-en
General
-
Target
582f9e1f97072a8361bb0fe1eeee08bc026d31ba069e4e1020a9cbe03dc2f01a
-
Size
766KB
-
MD5
55d3fa6159dc5b7bdf41242d8710a632
-
SHA1
5b56b2039ea90cd5f4a43acfa5e3622241de954b
-
SHA256
582f9e1f97072a8361bb0fe1eeee08bc026d31ba069e4e1020a9cbe03dc2f01a
-
SHA512
0f879387549769e930668270e41745141b85d89759b618637a650cbf4ce7919c7935b3e2f2ab02c03112a8faa0fda8f0220adeef8ee32e0362ff16e0d76f88a8
-
SSDEEP
12288:UkbEbxPGJfREONBJ4ElmONlFv+omMZn7xnOE+UHCZLoildo6RxOarEnCCn6sP51g:UkYCfREgJb1+omMJ7xnOHHLKYOf6k1g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 582f9e1f97072a8361bb0fe1eeee08bc026d31ba069e4e1020a9cbe03dc2f01a
Files
-
582f9e1f97072a8361bb0fe1eeee08bc026d31ba069e4e1020a9cbe03dc2f01a.exe windows:5 windows x86 arch:x86
a46b46a28fb6d28bdbe8375808ce0fad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
DeleteFileW
GetFileSize
WriteFile
ReadFile
GetModuleHandleW
CreateFileA
FindClose
FindNextFileW
GlobalFree
DeviceIoControl
GetSystemDirectoryA
IsDebuggerPresent
OutputDebugStringW
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetVersionExW
CreateFileW
LoadLibraryW
GetLogicalDriveStringsW
TerminateProcess
GetCurrentProcess
OpenProcess
LocalFree
LocalAlloc
GetProcAddress
FreeLibrary
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
MoveFileW
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
DeleteCriticalSection
GetProcessHeap
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
GetModuleFileNameW
QueueUserWorkItem
GetCommandLineW
SetCurrentDirectoryW
SetEvent
GetLastError
CloseHandle
CreateEventW
GetCurrentThreadId
GetCurrentProcessId
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
WriteConsoleW
ReadConsoleW
SetEndOfFile
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetACP
GetStdHandle
GetModuleHandleExW
ExitProcess
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetFileType
GetTimeZoneInformation
RtlUnwind
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
VirtualFree
VirtualProtect
VirtualAlloc
LoadLibraryExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
WaitForSingleObject
Sleep
TryEnterCriticalSection
GetStringTypeW
QueryPerformanceCounter
SetLastError
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
advapi32
RegisterServiceCtrlHandlerW
SetServiceStatus
SetTokenInformation
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
GetUserNameW
RegisterEventSourceW
DeregisterEventSource
ReportEventW
StartServiceCtrlDispatcherW
ole32
CoUninitialize
CoInitialize
shell32
SHGetFolderPathW
CommandLineToArgvW
shlwapi
PathFileExistsW
PathRemoveFileSpecW
PathCombineW
psapi
GetProcessImageFileNameW
EnumProcesses
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
wtsapi32
WTSQueryUserToken
urlmon
ObtainUserAgentString
winhttp
WinHttpCrackUrl
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpWriteData
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
Sections
.text Size: 364KB - Virtual size: 363KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 171KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE