Static task
static1
Behavioral task
behavioral1
Sample
8465368895aae5f39fd68117d05891210d733d6ce98c93418c2839948aa2d468.exe
Resource
win7-20240508-en
General
-
Target
8465368895aae5f39fd68117d05891210d733d6ce98c93418c2839948aa2d468
-
Size
2.2MB
-
MD5
b35dec6d096992a1d7bf7fc3f12a8806
-
SHA1
ecdbe081485fc72e57241e842890d96936397627
-
SHA256
8465368895aae5f39fd68117d05891210d733d6ce98c93418c2839948aa2d468
-
SHA512
b459c222547f61ea7b40b338e57c57df5557a9520a62206805684f95cebbf82336b925faae99e88a4b1b0ce5308cbd52ccfce5d7bc1ed4e88010a5d597b258f0
-
SSDEEP
49152:nA9DTQ11ffNv4QFNy99tzeQJMazTUTFZCbm3Mc7NrgOPnSk6dI3FRC:nJXfVv4QPyBiQRHKx7NrgP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 8465368895aae5f39fd68117d05891210d733d6ce98c93418c2839948aa2d468
Files
-
8465368895aae5f39fd68117d05891210d733d6ce98c93418c2839948aa2d468.exe windows:5 windows x86 arch:x86
a5cc659da193ac2d8230db4721907ff8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetFileSize
WriteFile
ReadFile
FindClose
lstrcpyW
GetTempPathW
CreateFileW
GetFileAttributesW
GetFileAttributesExW
DeleteFileW
FindFirstFileW
FindNextFileW
CopyFileW
MoveFileExW
GetTickCount
DecodePointer
HeapReAlloc
HeapSize
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryW
GetVersionExW
ReleaseMutex
CreateMutexW
GetVolumeInformationW
GetLongPathNameW
WaitForSingleObject
FileTimeToSystemTime
GlobalAlloc
GlobalFree
OpenProcess
GetExitCodeProcess
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DeviceIoControl
OutputDebugStringA
SetPriorityClass
GetTempFileNameW
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
UnhandledExceptionFilter
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
OutputDebugStringW
SetStdHandle
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetEndOfFile
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
Sleep
CreateEventW
LoadLibraryW
GetSystemDirectoryW
GetModuleFileNameW
InitializeCriticalSection
CreateThread
OpenFileMappingW
UnmapViewOfFile
FlushViewOfFile
MapViewOfFile
CloseHandle
IsBadReadPtr
LoadLibraryA
GetNativeSystemInfo
SetLastError
GetProcessHeap
HeapFree
HeapAlloc
GetFullPathNameW
GetCurrentDirectoryW
SetConsoleMode
ReadConsoleInputA
SystemTimeToTzSpecificLocalTime
TlsSetValue
GetPrivateProfileIntW
VirtualProtect
VirtualFree
VirtualAlloc
GetProcAddress
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
GetDriveTypeW
FreeLibraryAndExitThread
ExitThread
SystemTimeToFileTime
GetSystemTime
GlobalMemoryStatus
FlushConsoleInputBuffer
FormatMessageA
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
VerifyVersionInfoA
GetSystemDirectoryA
GetModuleHandleA
VerSetConditionMask
SleepEx
GetFileAttributesExA
SwitchToThread
QueryPerformanceFrequency
advapi32
CryptAcquireContextA
CryptDestroyHash
CryptSignHashA
DuplicateTokenEx
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyW
RegEnumKeyW
RegCreateKeyExW
RegQueryValueExW
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
DeregisterEventSource
RegisterEventSourceA
ReportEventA
CryptCreateHash
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptEnumProvidersA
RegCloseKey
RegOpenKeyExW
shell32
SHGetFolderPathW
SHGetSpecialFolderPathW
shlwapi
PathFileExistsW
PathIsDirectoryW
user32
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
LoadStringW
wsprintfW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
iphlpapi
GetAdaptersInfo
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertGetCertificateContextProperty
CertOpenStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
ws2_32
htonl
shutdown
gethostbyname
WSAGetLastError
socket
getservbyname
__WSAFDIsSet
select
WSASetLastError
recv
send
bind
closesocket
connect
getpeername
getsockopt
htons
ntohs
setsockopt
WSAStartup
WSACleanup
getaddrinfo
gethostname
ioctlsocket
sendto
recvfrom
listen
freeaddrinfo
getsockname
WSAIoctl
accept
wldap32
ord22
ord50
ord41
ord211
ord60
ord26
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord143
ord217
ord46
wininet
InternetOpenUrlW
InternetSetOptionW
InternetQueryOptionW
InternetReadFile
HttpQueryInfoW
InternetCloseHandle
InternetOpenW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 407KB - Virtual size: 406KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 45KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 136KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE