Static task
static1
Behavioral task
behavioral1
Sample
117b636591d1cef3b372b51694d72dc78b4cb37f998984d966541ead4cbe5172.exe
Resource
win7-20240508-en
General
-
Target
117b636591d1cef3b372b51694d72dc78b4cb37f998984d966541ead4cbe5172.exe
-
Size
2.2MB
-
MD5
017b6def2a637a5f4d26b85bfa2a903b
-
SHA1
83b3b2e971a5f30163bd5e4f9d4b827021cbe291
-
SHA256
117b636591d1cef3b372b51694d72dc78b4cb37f998984d966541ead4cbe5172
-
SHA512
3eabc553fdb1bef1551581f7e323f8c157d1e1387c50f04306d34294f0fff790de7bd1954368091ff3a56d34f488d41b6993d7b1e557b44f1960b71372e6ad65
-
SSDEEP
49152:wdggggMlwsDgo3aKfft5OtH17CZZK2KP/hk4wEvea+jWJ:vwY+KXnCH17CXgh/J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 117b636591d1cef3b372b51694d72dc78b4cb37f998984d966541ead4cbe5172.exe
Files
-
117b636591d1cef3b372b51694d72dc78b4cb37f998984d966541ead4cbe5172.exe.exe windows:5 windows x86 arch:x86
8f4a1df9179fade0a714839daa6d58b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageW
LoadLibraryW
GetVersionExW
GetModuleHandleW
CreateFileA
GetCurrentProcess
CreateDirectoryW
OpenProcess
GetLogicalDriveStringsW
GetEnvironmentVariableW
SetEvent
ResetEvent
CreateEventW
TerminateProcess
DeviceIoControl
GetSystemDirectoryA
GetProcAddress
VirtualFree
VirtualProtect
SetLastError
LoadLibraryA
IsBadReadPtr
IsDebuggerPresent
OutputDebugStringW
FreeLibrary
CreateFileW
FindResourceExW
ReadFile
WriteFile
GetFileSize
LocalFree
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
MoveFileW
VirtualQuery
GetModuleFileNameA
DeleteFileW
WaitForMultipleObjects
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
VerifyVersionInfoW
MoveFileExW
FindNextFileW
FindFirstFileW
GetSystemDirectoryW
GetNativeSystemInfo
GetSystemTime
FindClose
VerSetConditionMask
GetCurrentProcessId
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
Sleep
GetCurrentThreadId
FindResourceW
SizeofResource
LoadResource
LockResource
GetCommandLineW
CreateMutexW
CloseHandle
WaitForSingleObject
ReleaseMutex
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
SystemTimeToFileTime
ConvertThreadToFiber
ConvertFiberToThread
GlobalMemoryStatus
CreateFiber
DeleteFiber
SwitchToFiber
SetConsoleMode
ReadConsoleA
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
DecodePointer
VirtualAlloc
TryEnterCriticalSection
GetStringTypeW
QueryPerformanceCounter
QueryPerformanceFrequency
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SleepEx
CompareFileTime
GetEnvironmentVariableA
GetFileType
GetStdHandle
PeekNamedPipe
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlUnwind
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetFilePointerEx
ExitThread
GetModuleHandleExW
GetFileAttributesExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
GetACP
ReadConsoleW
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
SetEndOfFile
WriteConsoleW
SetConsoleCtrlHandler
FlushFileBuffers
GetCurrentDirectoryW
GetFullPathNameW
user32
DefWindowProcW
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
advapi32
CryptEnumProvidersW
CryptSignHashW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptCreateHash
CryptDestroyHash
GetUserNameW
LookupAccountSidW
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
SetEntriesInAclW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
CryptGenRandom
ole32
CoUninitialize
CoInitialize
shell32
SHGetFolderPathW
CommandLineToArgvW
shlwapi
PathCombineW
PathRemoveFileSpecW
SHDeleteKeyW
PathFileExistsW
PathFindFileNameW
urlmon
ObtainUserAgentString
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
psapi
GetProcessImageFileNameW
EnumProcesses
crypt32
CertDuplicateCertificateContext
CertOpenSystemStoreW
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertFreeCertificateContext
CertEnumCertificatesInStore
CertCloseStore
CertGetCertificateContextProperty
CertOpenStore
CertFindCertificateInStore
ws2_32
gethostname
recvfrom
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
freeaddrinfo
shutdown
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSAGetLastError
send
recv
closesocket
getnameinfo
sendto
wldap32
ord301
ord133
ord79
ord142
ord167
ord46
ord127
ord147
ord145
ord219
ord27
ord14
ord216
ord208
ord41
ord117
ord26
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 477KB - Virtual size: 477KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 41KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE