Static task
static1
Behavioral task
behavioral1
Sample
file.0xe108ca840d00.0xe108cae4fb20.ImageSectionObject.CONSCTLX.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
file.0xe108ca840d00.0xe108cae4fb20.ImageSectionObject.CONSCTLX.exe
Resource
win10v2004-20240802-en
General
-
Target
file.0xe108ca840d00.0xe108cae4fb20.ImageSectionObject.CONSCTLX.EXE
-
Size
1.6MB
-
MD5
b94b38401cdf3243b8c5bb78ea35a50c
-
SHA1
097a1322120647519258f83d7427fe9b86f2dc0a
-
SHA256
95d4c9ee0070d70533e5d2cd11f8067a8279afbdafc679a2aa0d81a7e8bc2373
-
SHA512
e7aa24efe1d84278e9b6cca0c2ca95ef28034f2668444b054fd108b3ce2544a666d8c14fd3cc28707993043d0026bb948c052b901b0a7fccb502532ddab72a1c
-
SSDEEP
24576:YL5bzQBO1vOXm1k/EbClfa9qiu+Og1visNiCejn:YL5XQBm7c6Clfa9BdiCej
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource file.0xe108ca840d00.0xe108cae4fb20.ImageSectionObject.CONSCTLX.EXE
Files
-
file.0xe108ca840d00.0xe108cae4fb20.ImageSectionObject.CONSCTLX.EXE.exe windows:5 windows x64 arch:x64
cfb41ff8f6736b105f214ada67e1856f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
winhttp
WinHttpReceiveResponse
WinHttpSetOption
WinHttpSendRequest
WinHttpConnect
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpSetStatusCallback
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpOpenRequest
WinHttpSetDefaultProxyConfiguration
WinHttpReadData
WinHttpSetCredentials
WinHttpAddRequestHeaders
WinHttpCrackUrl
ws2_32
WSAIoctl
inet_addr
WSARecv
select
WSAGetLastError
htons
connect
socket
WSASetLastError
closesocket
gethostbyname
ioctlsocket
inet_ntoa
kernel32
GetCurrentProcessId
ResumeThread
CreateThread
OpenFile
QueryDosDeviceA
GetFileAttributesA
GetVersionExA
TerminateProcess
GetShortPathNameA
FindFirstFileA
FindClose
ResetEvent
GetProfileStringA
FindNextFileA
DeleteFileA
DeleteCriticalSection
GetFileSize
FindResourceA
lstrcmpA
SetFilePointer
MapViewOfFile
UnmapViewOfFile
LoadResource
GetCurrentProcess
GetTimeFormatA
WriteFile
EnumResourceTypesA
GetDriveTypeA
InitializeCriticalSectionAndSpinCount
SizeofResource
FileTimeToSystemTime
RemoveDirectoryA
SetFileAttributesA
CreateFileMappingA
LockResource
EnumResourceNamesA
OpenFileMappingA
GetCurrentThread
CreateEventW
HeapAlloc
HeapFree
GetProcessHeap
HeapReAlloc
GlobalMemoryStatus
FindFirstFileW
GetLocaleInfoA
MoveFileExA
lstrcpynA
SetEndOfFile
SystemTimeToFileTime
CompareFileTime
ExpandEnvironmentStringsA
SetFileTime
GetWindowsDirectoryA
WideCharToMultiByte
VirtualFreeEx
ReadProcessMemory
GetTimeZoneInformation
GetEnvironmentVariableA
FlushFileBuffers
CreateDirectoryA
SetCurrentDirectoryA
GetStartupInfoA
lstrcmpiA
GetThreadLocale
CopyFileA
VirtualAllocEx
OpenMutexA
WritePrivateProfileStringA
MoveFileA
GlobalMemoryStatusEx
GetDiskFreeSpaceA
SetProcessWorkingSetSize
SetEnvironmentVariableA
WriteProfileStringA
CreateMutexA
FindNextFileW
GetCurrentDirectoryA
GetFileTime
DuplicateHandle
ReleaseMutex
GetVersion
DeleteFileW
GetFileInformationByHandle
GetSystemTime
SetFileAttributesW
AreFileApisANSI
LocalFileTimeToFileTime
SystemTimeToTzSpecificLocalTime
WaitForMultipleObjects
WriteProcessMemory
CreateMutexW
CreateRemoteThread
GetOverlappedResult
OpenEventW
GetSystemTimeAsFileTime
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ExitThread
RaiseException
RtlPcToFileHeader
GetCommandLineA
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
HeapSetInformation
GetExitCodeThread
LocalAlloc
LoadLibraryA
ReadFile
CreateProcessA
GetExitCodeProcess
TerminateThread
GetProcessTimes
WaitForSingleObjectEx
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
OpenProcess
FreeLibrary
GetCurrentThreadId
GetModuleFileNameA
SetLastError
InitializeCriticalSection
LocalFree
GetTempPathA
GetModuleHandleA
GetLocalTime
GetTempFileNameA
EnterCriticalSection
MultiByteToWideChar
lstrcatA
CreateFileW
LeaveCriticalSection
CreateEventA
Sleep
GetDateFormatA
FormatMessageA
GetTickCount
SetEvent
WaitForSingleObject
CloseHandle
DeviceIoControl
GetLastError
GetVersionExW
CreateFileA
GetFullPathNameA
ExitProcess
lstrcpyA
GetPrivateProfileSectionA
GetPrivateProfileStringA
GetSystemDirectoryA
lstrlenA
GetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
SetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
GetModuleHandleW
RtlUnwindEx
GetFileType
HeapCreate
HeapSize
user32
OpenDesktopA
SetSystemCursor
SendInput
CloseWindowStation
CopyImage
CreateCursor
GetProcessWindowStation
OpenInputDesktop
FindWindowExA
GetUserObjectSecurity
CloseDesktop
SendMessageA
EnumWindows
SetCursorPos
RedrawWindow
DestroyCursor
GetCursorPos
PostMessageA
EqualRect
IsWindowVisible
GetWindowThreadProcessId
RegisterClassExA
SetForegroundWindow
LoadIconA
GetWindowInfo
GetForegroundWindow
GetWindowRect
SetProcessWindowStation
OpenWindowStationA
CreateWindowExA
DefWindowProcA
SetWindowsHookExA
SetWindowPos
UnhookWindowsHookEx
GetSystemMetrics
LoadCursorA
CharLowerA
GetDesktopWindow
CharUpperA
wsprintfA
FindWindowA
GetMessageA
TranslateMessage
PeekMessageA
DispatchMessageA
SystemParametersInfoA
RegisterWindowMessageA
advapi32
RegSetValueExA
CreateServiceA
SetSecurityDescriptorSacl
ControlService
GetUserNameA
GetSecurityDescriptorSacl
IsValidSid
OpenSCManagerA
GetSecurityDescriptorOwner
ImpersonateLoggedOnUser
QueryServiceStatus
DuplicateTokenEx
RegQueryValueExA
RegDeleteKeyA
RegCreateKeyA
RegCreateKeyExA
RegEnumKeyA
RegCloseKey
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyExA
RegOpenKeyA
OpenProcessToken
GetTokenInformation
LookupAccountSidA
RegOpenKeyExA
RegNotifyChangeKeyValue
LookupPrivilegeValueA
RevertToSelf
AdjustTokenPrivileges
OpenThreadToken
RegQueryInfoKeyA
CreateProcessAsUserA
OpenServiceA
CloseServiceHandle
RegisterEventSourceA
GetSidSubAuthority
DeleteService
GetSidSubAuthorityCount
DuplicateToken
DeregisterEventSource
InitializeSecurityDescriptor
StartServiceA
LookupAccountNameW
SetSecurityDescriptorDacl
ReportEventA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetDesktopFolder
ole32
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
CoInitializeSecurity
CoInitializeEx
StringFromGUID2
CoCreateGuid
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 263KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 214KB - Virtual size: 383KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ