Static task
static1
Behavioral task
behavioral1
Sample
0b38905ddfe7e82cae15d759c8ee4e7dfe2baab5f47c3314e146b9698c23933a.exe
Resource
win7-20240508-en
General
-
Target
0b38905ddfe7e82cae15d759c8ee4e7dfe2baab5f47c3314e146b9698c23933a
-
Size
2.2MB
-
MD5
166504658070522b69a8902522958a4b
-
SHA1
12bbc744924216d757e92817b65620a7f2f3d597
-
SHA256
0b38905ddfe7e82cae15d759c8ee4e7dfe2baab5f47c3314e146b9698c23933a
-
SHA512
c2a596a900e039cca7acbea932970b430104429fcb1a031776aa02b83ce1fb182c0e6dc73ed5bf0159ad9ae4ac5d394bf533fad063e16ab480c4a8d50be80e68
-
SSDEEP
49152:n6PJ7HeLg3W9uPn2u8PhS0A08QrW1hHvDNU33laduD/dB3dW6bUyuFlIAFQmd8WU:Pkn2qduD/dvUyuFC4Qmd1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b38905ddfe7e82cae15d759c8ee4e7dfe2baab5f47c3314e146b9698c23933a
Files
-
0b38905ddfe7e82cae15d759c8ee4e7dfe2baab5f47c3314e146b9698c23933a.exe windows:6 windows x64 arch:x64
581c1a4658b4ae319b75030c65b96a93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegGetValueW
RegCloseKey
CryptAcquireContextW
CryptGenRandom
CryptReleaseContext
RegOpenKeyExA
kernel32
GetFileType
WriteConsoleW
GetCurrentProcess
LeaveCriticalSection
LoadLibraryW
GetProcAddress
EnterCriticalSection
InitializeCriticalSection
SetUnhandledExceptionFilter
SetConsoleCtrlHandler
SetErrorMode
RtlCaptureContext
GetCurrentThread
GetCurrentThreadId
GetLastError
GetCurrentProcessId
CloseHandle
ExpandEnvironmentStringsW
SetLastError
GetEnvironmentVariableW
GetNativeSystemInfo
GetProcessTimes
GetCommandLineW
FindFirstFileW
FindNextFileW
FindClose
GetModuleFileNameW
GetLongPathNameW
GetConsoleMode
GetStdHandle
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetSystemTimeAsFileTime
GetModuleHandleW
GetFileAttributesW
CreateFileW
GetCurrentDirectoryW
CreateDirectoryW
SetCurrentDirectoryW
GetVolumePathNameW
GetDriveTypeW
GetFinalPathNameByHandleW
Sleep
GetFileInformationByHandle
MoveFileExW
SetFileTime
CreateFileMappingW
MapViewOfFile
VirtualQuery
DuplicateHandle
UnmapViewOfFile
FlushFileBuffers
GetSystemInfo
FindFirstFileExW
GetSystemTime
SystemTimeToFileTime
SetFileInformationByHandle
ReadFile
MultiByteToWideChar
WideCharToMultiByte
RaiseException
WaitForSingleObject
CreateProcessW
CreateJobObjectW
SetInformationJobObject
AssignProcessToJobObject
TerminateProcess
SetProcessAffinityMask
ResumeThread
K32GetProcessMemoryInfo
GetExitCodeProcess
SearchPathW
FormatMessageA
LocalFree
VirtualProtect
FreeLibrary
LoadLibraryExA
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
QueryPerformanceCounter
InitializeSListHead
InitOnceBeginInitialize
InitOnceComplete
InitializeCriticalSectionAndSpinCount
msvcp140
?_Xbad_function_call@std@@YAXXZ
?_Raise_handler@std@@3P6AXAEBVexception@stdext@@@ZEA
?_Xlength_error@std@@YAXPEBD@Z
?_Syserror_map@std@@YAPEBDH@Z
_Mtx_lock
_Mtx_unlock
?_Throw_C_error@std@@YAXH@Z
_Mtx_init_in_situ
?_Winerror_map@std@@YAHH@Z
?_Xout_of_range@std@@YAXPEBD@Z
_Mtx_destroy_in_situ
?set_new_handler@std@@YAP6AXXZP6AXXZ@Z
vcruntime140
__std_exception_destroy
__std_exception_copy
__current_exception_context
__current_exception
__C_specific_handler
strchr
memchr
memset
_purecall
memcmp
memmove
memcpy
_CxxThrowException
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-heap-l1-1-0
_set_new_mode
_callnewh
calloc
realloc
free
malloc
api-ms-win-crt-runtime-l1-1-0
abort
_invalid_parameter_noinfo_noreturn
exit
_set_abort_behavior
terminate
signal
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_cexit
_set_error_mode
_seh_filter_exe
_set_app_type
_invoke_watson
_get_initial_narrow_environment
_initterm
_initterm_e
_exit
_errno
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
api-ms-win-crt-string-l1-1-0
islower
isupper
tolower
isalpha
toupper
strcmp
isalnum
wcslen
strnlen
strncmp
strlen
api-ms-win-crt-utility-l1-1-0
qsort
srand
rand
_byteswap_ushort
api-ms-win-crt-stdio-l1-1-0
fflush
__p__commode
_fileno
_lseek
_write
_close
_set_fmode
_open_osfhandle
_setmode
_get_osfhandle
_lseeki64
__acrt_iob_func
__stdio_common_vsprintf
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-math-l1-1-0
ceilf
log10
__setusermatherr
api-ms-win-crt-time-l1-1-0
_localtime64
_time64
asctime
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE