Static task
static1
Behavioral task
behavioral1
Sample
EMOQ-WORKME (1).exe
Resource
win10-20240404-en
General
-
Target
EMOQ-WORKME (1).exe
-
Size
3.3MB
-
MD5
1500cac3672c7590581607a0666886d5
-
SHA1
4ac10923ecdc8ffdd0c00d1868ecbc8132dbe0d4
-
SHA256
4a85c62e4c35221b4cfe5fd409e73c0ec69c3b036428ad45bf2188030526fc74
-
SHA512
3856f628e8a55ebcc8e4b34eac57bddc0c2a0d75722ddd1ffb0044086ece639ad81ff72879ed86d2ffea85c84c4e6761f97b5865a515cd323aed47ba7f92ffd9
-
SSDEEP
49152:FGtlqtwIU6iNSUY7QNfN39x9i+12/fDvRPwVo0Lwg1rHchnRjg4ICXV+CeZ0iP84:d+NLx9x9i+KwHZHkI6k+ftx2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource EMOQ-WORKME (1).exe
Files
-
EMOQ-WORKME (1).exe.exe windows:6 windows x64 arch:x64
dc61add011d961a40704012f1ae140fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
select
__WSAFDIsSet
inet_pton
shutdown
WSASetLastError
bind
getnameinfo
gethostname
sendto
recvfrom
ntohl
freeaddrinfo
getaddrinfo
ioctlsocket
listen
htonl
socket
send
recv
closesocket
accept
WSACleanup
WSAStartup
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
WSAGetLastError
wldap32
ord45
ord211
ord60
ord50
ord46
ord41
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord22
ord143
crypt32
CryptQueryObject
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CertGetNameStringA
CertAddCertificateContextToStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
advapi32
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
CopySid
IsValidSid
OpenProcessToken
ConvertSidToStringSidW
GetLengthSid
GetTokenInformation
kernel32
ExitProcess
VirtualQuery
VirtualProtect
VirtualAlloc
ExitThread
LoadLibraryExW
RtlPcToFileHeader
InterlockedPushEntrySList
FreeLibraryAndExitThread
GetDriveTypeW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SetFilePointerEx
SetConsoleCtrlHandler
GetCommandLineA
GetCommandLineW
GetConsoleOutputCP
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetFileAttributesExW
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
FlushFileBuffers
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEndOfFile
WriteConsoleW
GetSystemInfo
WaitForSingleObjectEx
WriteProcessMemory
GetConsoleScreenBufferInfo
HeapFree
SetConsoleTextAttribute
SetConsoleTitleA
GetCurrentProcess
GetStdHandle
SetCurrentConsoleFontEx
TerminateProcess
GetModuleFileNameW
K32GetModuleFileNameExW
InitializeCriticalSectionEx
WaitForSingleObject
CreateFileW
ResumeThread
OpenProcess
HeapSize
CreateToolhelp32Snapshot
Sleep
GetLastError
Process32NextW
FillConsoleOutputCharacterW
LoadLibraryA
Process32FirstW
HeapReAlloc
CloseHandle
CreateThread
HeapAlloc
Module32FirstW
GetCurrentConsoleFontEx
DecodePointer
HeapDestroy
GetThreadContext
VirtualAllocEx
LocalFree
DeleteCriticalSection
GetProcessHeap
CreateProcessW
WideCharToMultiByte
GetConsoleWindow
Module32NextW
K32EnumProcessModules
DebugBreak
SetConsoleCursorPosition
SetThreadContext
IsDebuggerPresent
GetExitCodeProcess
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
FormatMessageA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SleepEx
VerSetConditionMask
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
GetProcAddress
VerifyVersionInfoA
RtlUnwind
ExpandEnvironmentStringsA
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
CreateFileA
GetFileSizeEx
GetEnvironmentVariableW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
MultiByteToWideChar
FormatMessageW
WriteFile
GetModuleHandleW
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlVirtualUnwind
SwitchToFiber
DeleteFiber
CreateFiber
LoadLibraryW
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
RtlUnwindEx
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
RaiseException
OutputDebugStringW
GetCPInfo
GetStringTypeW
SleepConditionVariableSRW
WakeAllConditionVariable
LCMapStringEx
EncodePointer
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
user32
SetWindowLongW
SetLayeredWindowAttributes
MessageBoxA
FindWindowA
GetProcessWindowStation
MessageBoxW
GetUserObjectInformationW
GetWindowLongW
shell32
ShellExecuteA
userenv
UnloadUserProfile
rpcrt4
RpcStringFreeA
UuidToStringA
UuidCreate
bcrypt
BCryptGenRandom
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 783KB - Virtual size: 783KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ