Static task
static1
Behavioral task
behavioral1
Sample
9238c75a0641a1d318779d28b6fd3f1e0c97de62924b54ad3e90022537a5786d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9238c75a0641a1d318779d28b6fd3f1e0c97de62924b54ad3e90022537a5786d.exe
Resource
win10v2004-20240802-en
General
-
Target
9238c75a0641a1d318779d28b6fd3f1e0c97de62924b54ad3e90022537a5786d
-
Size
1.2MB
-
MD5
71bd11b355f090ac38e1450fea808343
-
SHA1
ce3d8c8a14dd4bf1690d3dfecff82dfb5952cd78
-
SHA256
9238c75a0641a1d318779d28b6fd3f1e0c97de62924b54ad3e90022537a5786d
-
SHA512
aef6b7d8358e525670b0bf90500de942f014c810c91454c283ae5d2cae7906cb3e87b27043403cf4ad85ba11d134cc58689fb6c63d7569ad8e14573ca67a45c2
-
SSDEEP
24576:wHfGVfEAJH0UY1bucubA/qkmWsL4OLlEZG0jIpXwDFB:c1UY1bruABxsrhEZjG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9238c75a0641a1d318779d28b6fd3f1e0c97de62924b54ad3e90022537a5786d
Files
-
9238c75a0641a1d318779d28b6fd3f1e0c97de62924b54ad3e90022537a5786d.exe windows:51 windows x64 arch:x64
62a314ea7ec62a8789ed29ffa7723e34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
version
GetFileVersionInfoSizeA
kernel32
DeleteCriticalSection
QueryPerformanceFrequency
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
SetLastError
FormatMessageW
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
GetCurrentProcessId
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
SleepEx
VerSetConditionMask
VerifyVersionInfoW
CreateFileA
GetFileSizeEx
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
HeapSize
GetTimeZoneInformation
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetTickCount
QueryPerformanceCounter
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetExitCodeProcess
AllocConsole
CreateProcessA
GetProcAddress
CloseHandle
Process32Next
LoadLibraryA
GetLastError
DeleteFileW
GetStringTypeW
RaiseException
RtlPcToFileHeader
RtlUnwindEx
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFullPathNameW
GetCurrentDirectoryW
SetEndOfFile
SetStdHandle
FlushFileBuffers
HeapReAlloc
GetFileAttributesExW
CreateProcessW
WaitForSingleObject
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapFree
HeapAlloc
GetConsoleOutputCP
InitializeSListHead
ReadConsoleW
GetConsoleMode
WriteFile
GetModuleFileNameW
SetFilePointerEx
FreeLibraryAndExitThread
ExitThread
CreateThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
Sleep
CreateToolhelp32Snapshot
TerminateProcess
VirtualAlloc
lstrlenW
GetCurrentProcess
VirtualFree
VirtualProtect
Process32First
GetModuleFileNameA
WriteConsoleW
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentThreadId
GetModuleHandleW
GetStartupInfoW
GetDriveTypeW
CreateFileW
GetModuleHandleExW
ExitProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
LoadLibraryExW
user32
ShowWindow
MessageBoxA
EnumWindows
GetWindowThreadProcessId
winspool.drv
StartDocPrinterA
advapi32
GetTokenInformation
AdjustTokenPrivileges
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
OpenProcessToken
LookupPrivilegeValueA
shell32
ShellExecuteExA
ole32
CoCreateInstance
normaliz
IdnToUnicode
IdnToAscii
ws2_32
getsockopt
gethostname
ioctlsocket
getpeername
sendto
recvfrom
freeaddrinfo
getaddrinfo
recv
listen
htonl
getsockname
connect
bind
accept
select
__WSAFDIsSet
socket
htons
WSAIoctl
setsockopt
WSACleanup
WSAStartup
WSASetLastError
ntohs
WSAGetLastError
closesocket
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
wldap32
ord50
ord217
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord22
ord41
ord45
ord60
ord211
ord46
ord143
crypt32
CertOpenStore
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CryptStringToBinaryA
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertCloseStore
CertFreeCertificateChain
sensapi
IsDestinationReachableA
magnification
MagUninitialize
xinput1_4
ord3
bcrypt
BCryptGenRandom
Sections
.text Size: 984KB - Virtual size: 983KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 246B - Virtual size: 234B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ