Static task
static1
Behavioral task
behavioral1
Sample
818db8a0338d4515a467c41151d0bf760f543e9936eebcadbfa609c30458f19f.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
818db8a0338d4515a467c41151d0bf760f543e9936eebcadbfa609c30458f19f.exe
Resource
win10v2004-20240802-en
General
-
Target
818db8a0338d4515a467c41151d0bf760f543e9936eebcadbfa609c30458f19f
-
Size
2.5MB
-
MD5
50753b2151e65602a7dd01f23ac052d9
-
SHA1
e377f1a77a569de289a73131a56134a3fb37bfdd
-
SHA256
818db8a0338d4515a467c41151d0bf760f543e9936eebcadbfa609c30458f19f
-
SHA512
64aef8d31f2d838ac0b605e93ede9e7551987f07509aa15e6d668d282c235478beede10a05cea3557b55021c7c913e193aaa77f0368c053a39c8cb057e3a19ef
-
SSDEEP
49152:2360iAXUW/2wLWG32LANar6IabUKIAPR1D3rFSRFNdSOdzJPRNugqRgQpV80x8SZ:2jAAXPR53rFi7ZY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 818db8a0338d4515a467c41151d0bf760f543e9936eebcadbfa609c30458f19f
Files
-
818db8a0338d4515a467c41151d0bf760f543e9936eebcadbfa609c30458f19f.exe windows:6 windows x86 arch:x86
289a3900fc0825107113ed2a50cdd8b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VariantClear
advapi32
StartServiceA
OpenSCManagerA
DeleteService
CreateServiceA
ControlService
CloseServiceHandle
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
OpenServiceA
RegSetValueExA
RegQueryValueExA
RegFlushKey
RegDisableReflectionKey
RegCreateKeyExA
RegCloseKey
crypt32
CertDuplicateCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
CertFreeCertificateContext
CertGetCertificateContextProperty
kernel32
CreateMutexA
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
SwitchToThread
DeviceIoControl
CreateFileA
ReleaseMutex
GlobalMemoryStatusEx
GetPhysicallyInstalledSystemMemory
GetCurrentThreadId
CloseHandle
GetLastError
GetCurrentProcessId
GetSystemFirmwareTable
GetModuleFileNameA
LocalFree
FormatMessageA
GetTempPathA
GetSystemDirectoryA
GetNativeSystemInfo
GetWindowsDirectoryA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RaiseException
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
GetProcessHeap
VirtualQuery
FreeLibrary
Sleep
SetLastError
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryA
GetStdHandle
GetFileType
WriteFile
GetModuleHandleExW
VirtualFree
GetEnvironmentVariableW
GetACP
LoadLibraryW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
FindClose
FindFirstFileW
FindNextFileW
QueryPerformanceFrequency
DecodePointer
GetThreadTimes
WriteConsoleW
SetEndOfFile
HeapSize
GetFullPathNameW
GetCurrentDirectoryW
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
MoveFileExW
DeleteFileW
CreatePipe
GetFileAttributesExW
GetExitCodeProcess
WaitForSingleObject
HeapReAlloc
FlushFileBuffers
GetFileSizeEx
GetConsoleCP
SetFilePointerEx
EnumSystemLocalesW
HeapFree
RtlUnwind
GetModuleFileNameW
LoadLibraryExW
EncodePointer
ExitProcess
ReadFile
DuplicateHandle
CreateProcessW
FindFirstFileExW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineA
GetCommandLineW
SetConsoleCtrlHandler
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
GetCurrentThread
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
bcrypt
BCryptGenRandom
ws2_32
inet_addr
connect
recv
send
htons
inet_ntoa
setsockopt
shutdown
socket
WSAStartup
ioctlsocket
getsockopt
ntohs
select
gethostbyname
WSACleanup
WSAGetLastError
htonl
gethostbyaddr
getservbyport
getservbyname
WSASetLastError
closesocket
user32
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxW
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 593KB - Virtual size: 593KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 648B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ