Static task
static1
Behavioral task
behavioral1
Sample
671f428ee3d483e292252258268a0d489e53c491c2004e789e589a77be0198a2.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
671f428ee3d483e292252258268a0d489e53c491c2004e789e589a77be0198a2.exe
Resource
win10v2004-20240611-en
General
-
Target
671f428ee3d483e292252258268a0d489e53c491c2004e789e589a77be0198a2
-
Size
3.3MB
-
MD5
86af3e74d0f97ac7834090f0eeac7e9c
-
SHA1
07ddd4f28dc1027cfd95d6e300aba08a2e901b6d
-
SHA256
671f428ee3d483e292252258268a0d489e53c491c2004e789e589a77be0198a2
-
SHA512
25b9b458bef7e51e426978829a0be1249e48bb79436a16b9dbc99e0c3127c527a5a0dd4f960c20b7fa63876f55fbf7cb19405a6d42037d8a8ba94753cb253aab
-
SSDEEP
98304:wUX1dSQn/xyGejrxhWj17Nro0ILIO2heKrQ0yhE7lGOSZ4Df4GQYcafVHtBOgPWW:w6xyGeXWI8v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 671f428ee3d483e292252258268a0d489e53c491c2004e789e589a77be0198a2
Files
-
671f428ee3d483e292252258268a0d489e53c491c2004e789e589a77be0198a2.exe windows:5 windows x86 arch:x86
1aabbaff2a7f809eb10959b607ae2d3f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetTempPathW
GetLongPathNameW
DeleteFileW
GetFileAttributesW
CreateFileW
GetTempFileNameW
CopyFileW
WriteFile
GetExitCodeProcess
GetLastError
GetFileSize
ReadFile
FindClose
FileTimeToSystemTime
lstrcpyW
GetFileAttributesExW
FindFirstFileW
FindNextFileW
MoveFileExW
DecodePointer
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryW
GetPrivateProfileIntW
CreateDirectoryW
ReleaseMutex
CreateMutexW
GetSystemDirectoryW
GetVolumeInformationW
LocalFree
GetSystemInfo
GetVersionExW
GlobalAlloc
GlobalFree
LocalAlloc
OpenProcess
CreateProcessW
IsProcessorFeaturePresent
Process32FirstW
Process32NextW
DeviceIoControl
OutputDebugStringA
SetPriorityClass
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
InitializeSListHead
GetACP
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
OutputDebugStringW
WaitForSingleObjectEx
SetStdHandle
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FlushFileBuffers
GetConsoleCP
GetTimeZoneInformation
WriteConsoleW
SetEndOfFile
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
CloseHandle
Sleep
WaitForSingleObject
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CreateThread
IsBadReadPtr
LoadLibraryA
GetNativeSystemInfo
SetLastError
GetProcessHeap
HeapFree
HeapAlloc
VirtualProtect
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
GetStartupInfoW
GetFullPathNameW
GetCurrentDirectoryW
GetStdHandle
IsDebuggerPresent
VirtualFree
VirtualAlloc
GetProcAddress
FreeLibrary
GetModuleFileNameW
WritePrivateProfileStringW
CreateToolhelp32Snapshot
GetPrivateProfileStringW
SetConsoleMode
ReadConsoleInputA
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FreeLibraryAndExitThread
ExitThread
SystemTimeToFileTime
GetSystemTime
GlobalMemoryStatus
FlushConsoleInputBuffer
FormatMessageA
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
VerifyVersionInfoA
QueryPerformanceFrequency
GetSystemDirectoryA
GetModuleHandleA
VerSetConditionMask
SleepEx
GetFileAttributesExA
ResetEvent
SwitchToThread
advapi32
RegQueryValueExW
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptCreateHash
CryptDestroyHash
CryptSignHashA
DeregisterEventSource
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyW
RegEnumKeyW
GetTokenInformation
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
CryptDecrypt
RegCreateKeyExW
RegisterEventSourceA
ReportEventA
CryptAcquireContextA
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptEnumProvidersA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExW
RegSetValueExW
shlwapi
PathFileExistsW
user32
LoadStringW
wsprintfW
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
ShellExecuteExW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
iphlpapi
GetAdaptersInfo
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertOpenStore
wininet
InternetOpenW
InternetQueryOptionW
InternetSetOptionW
InternetReadFile
InternetOpenUrlW
InternetCloseHandle
HttpQueryInfoW
wldap32
ord143
ord217
ord46
ord211
ord60
ord50
ord41
ord22
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ord26
ws2_32
WSAStartup
WSAIoctl
getservbyname
gethostbyname
setsockopt
ntohs
htons
getsockopt
getaddrinfo
htonl
getpeername
connect
closesocket
bind
send
recv
WSASetLastError
select
__WSAFDIsSet
socket
WSAGetLastError
WSACleanup
freeaddrinfo
accept
listen
recvfrom
sendto
ioctlsocket
gethostname
shutdown
getsockname
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 399KB - Virtual size: 399KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ