Static task
static1
Behavioral task
behavioral1
Sample
46bdb9c8311cf0528e46c69baaa020ba9d629aa8814a12813d736318831bcf14.exe
Resource
win7-20240508-en
General
-
Target
46bdb9c8311cf0528e46c69baaa020ba9d629aa8814a12813d736318831bcf14
-
Size
3.0MB
-
MD5
b8e420ddedb5bf6a0b88e1b9632be7f1
-
SHA1
d79c6253c1a97944964585064616dd802ef1f1e8
-
SHA256
46bdb9c8311cf0528e46c69baaa020ba9d629aa8814a12813d736318831bcf14
-
SHA512
ac08c1c45a8892e33c710f871b8ae73a7fa6d6ddd590e467e12a615575b99416d2e82a88841b50cd9c870a3d8c81ba71bb983c5802f458a270c167edf6c62f0e
-
SSDEEP
49152:QfD0uH569n5JIaz7uaaLr+PdUUCK7t9oN87JE3jM2ce:uXM6vSBNE3Xc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46bdb9c8311cf0528e46c69baaa020ba9d629aa8814a12813d736318831bcf14
Files
-
46bdb9c8311cf0528e46c69baaa020ba9d629aa8814a12813d736318831bcf14.exe windows:6 windows x64 arch:x64
c882e01a79fc794051a89c026cc69cc6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
CloseHandle
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
GetFileSizeEx
MultiByteToWideChar
SetLastError
GetCurrentThread
DeleteFileW
GetFileAttributesExW
FlushFileBuffers
GetTimeZoneInformation
WideCharToMultiByte
CreateDirectoryW
OutputDebugStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
GetProcessHeap
SetConsoleCtrlHandler
CreateFileW
HeapSize
HeapReAlloc
SetEndOfFile
WriteConsoleW
RaiseException
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
EncodePointer
RtlPcToFileHeader
WriteFile
GetStdHandle
GetLastError
GetWindowsDirectoryA
ReleaseMutex
WaitForSingleObject
CreateMutexA
SetEvent
CreateEventA
SetConsoleTitleA
LocalFree
FormatMessageA
DeleteFileA
FindFirstFileA
ReleaseSemaphore
GetVersion
CreateSemaphoreA
OpenProcess
SetHandleInformation
SetErrorMode
GetEnvironmentVariableA
GetEnvironmentVariableW
GetVersionExA
Sleep
GetEnvironmentStrings
FreeEnvironmentStringsA
lstrlenA
ResetEvent
GetLocalTime
CreateFileA
SetNamedPipeHandleState
SleepEx
WaitNamedPipeA
FindNextFileA
GetSystemWindowsDirectoryA
FindFirstFileW
GetProcessTimes
GetTickCount
GetModuleHandleA
GetDriveTypeA
GetVolumeInformationA
DeviceIoControl
LoadLibraryExA
DuplicateHandle
WaitForMultipleObjects
SetThreadPriority
GetThreadPriority
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
GetSystemDirectoryA
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
SetFileTime
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
LockFileEx
UnlockFileEx
CreateThread
ExitThread
FreeLibraryAndExitThread
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
MoveFileExW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetFullPathNameW
ReadFile
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetModuleFileNameW
FreeLibrary
shlwapi
PathRemoveFileSpecA
PathRemoveBackslashW
user32
GetDlgItemTextW
SetFocus
GetFocus
SendMessageA
GetDlgItemTextA
SetDlgItemTextA
GetDlgItem
MessageBoxA
GetActiveWindow
wsprintfA
ShowWindow
EndDialog
MoveWindow
SetWindowTextA
GetSystemMetrics
CreateDialogIndirectParamA
DialogBoxIndirectParamA
GetParent
GetClientRect
GetWindowRect
GetWindowLongA
MessageBeep
ScreenToClient
EnableWindow
netapi32
Netbios
comdlg32
GetOpenFileNameA
comctl32
ord17
wsock32
getpeername
ioctlsocket
inet_addr
__WSAFDIsSet
closesocket
connect
WSACleanup
WSAStartup
getsockname
getsockopt
htonl
getprotobyname
WSAGetLastError
socket
setsockopt
send
select
recv
inet_ntoa
shell32
ord680
oleaut32
VariantClear
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetLBound
VariantInit
SysAllocStringLen
SafeArrayGetUBound
SafeArrayDestroy
SysFreeString
SysAllocString
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
CoUninitialize
CoInitializeSecurity
ws2_32
getnameinfo
WSAPoll
getaddrinfo
inet_ntop
freeaddrinfo
psapi
GetProcessMemoryInfo
advapi32
RegEnumKeyExA
RegQueryInfoKeyA
StartServiceA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCloseKey
RegDeleteValueA
RegEnumValueA
RegOpenKeyExA
GetUserNameA
GetUserNameW
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
DeregisterEventSource
RegisterEventSourceA
ReportEventA
RegCreateKeyExA
CloseServiceHandle
OpenSCManagerA
OpenServiceA
QueryServiceStatus
dhcpcsvc
DhcpRequestParams
userenv
GetProfilesDirectoryA
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textidx Size: 940KB - Virtual size: 939KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 333KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 556KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE