Static task
static1
Behavioral task
behavioral1
Sample
15052024_1554_winver.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
15052024_1554_winver.exe
Resource
win10v2004-20240426-en
General
-
Target
15052024_1554_winver.exe
-
Size
411KB
-
MD5
319cc8df286242b248cf442ca4e87220
-
SHA1
0dd0aa9d73bfdf73825a17b8c7e78c3b8852f2ad
-
SHA256
5461ed9bfe7bb882cef5d0375ad962c4004b4fb84102451adc99f6029f1ecec0
-
SHA512
3e420214e031185865bb5ef192a0e0768c08982dfc033240422565ec223fce783b83dcfe8d732aa494e74822683ab8ecbe65ae1018e4282282505af33537ca53
-
SSDEEP
6144:BLlDKP3ZEdD1qtUJ1K+u6PiHDkSQCKO5fDp1O7mnkgBkA/EyG8XjMsXA:LKBEPgUJHkHDkSHP0mkgBkABTMN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15052024_1554_winver.exe
Files
-
15052024_1554_winver.exe.exe windows:6 windows x64 arch:x64
Password: infected
2f7f7af2eab30b7eb6756d354f206577
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
InitializeSListHead
GetCurrentThreadId
IsDebuggerPresent
GetCurrentProcess
GetEnvironmentVariableW
GetCurrentDirectoryW
SetLastError
GetStdHandle
GetCurrentProcessId
RtlLookupFunctionEntry
RtlVirtualUnwind
TryAcquireSRWLockExclusive
HeapFree
RtlCaptureContext
HeapReAlloc
AcquireSRWLockExclusive
ReleaseSRWLockShared
ReleaseMutex
GetModuleHandleA
GetProcessHeap
HeapAlloc
WaitForSingleObject
GetConsoleMode
SetThreadStackGuarantee
GetModuleHandleW
FormatMessageW
MultiByteToWideChar
WriteConsoleW
AddVectoredExceptionHandler
WaitForSingleObjectEx
CreateMutexA
ReleaseSRWLockExclusive
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CloseHandle
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetLastError
GetCurrentThread
VirtualProtect
VirtualAlloc
GetProcAddress
LoadLibraryA
GetConsoleWindow
AcquireSRWLockShared
IsProcessorFeaturePresent
user32
ShowWindow
ntdll
RtlNtStatusToDosError
NtWriteFile
vcruntime140
__CxxFrameHandler3
__current_exception_context
memcmp
_CxxThrowException
memmove
memcpy
__C_specific_handler
__current_exception
memset
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-runtime-l1-1-0
_initterm
_initterm_e
_initialize_narrow_environment
_exit
_set_app_type
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configure_narrow_argv
_get_initial_narrow_environment
_seh_filter_exe
exit
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 290KB - Virtual size: 290KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ