Static task
static1
Behavioral task
behavioral1
Sample
2132fe6374ea09d4a72b4776d3822c8432a16c653b7892087f85f8705f9a301c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2132fe6374ea09d4a72b4776d3822c8432a16c653b7892087f85f8705f9a301c.exe
Resource
win10v2004-20240802-en
General
-
Target
2132fe6374ea09d4a72b4776d3822c8432a16c653b7892087f85f8705f9a301c.exe
-
Size
1.5MB
-
MD5
471503294174d7315bcd378d2be8d050
-
SHA1
7eb8a4cc8060ecfe24d3102dd211e54042ddcc40
-
SHA256
2132fe6374ea09d4a72b4776d3822c8432a16c653b7892087f85f8705f9a301c
-
SHA512
cc30b12b87df4f582cdfc2ff5fe7d2b38e62ccecfb1005d862d1f1d4a9dcbe17b9c37071760bec319ae84870dbca28b351b135dc1caf685a6779407804cc423b
-
SSDEEP
24576:IsX2TXdHdVsyuf45ZAtZlL+ziq2e0OjYHpWSUtDn0ZbpWkRGGJ5cWe:IsX2TRxAtTyWq200FEnC9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2132fe6374ea09d4a72b4776d3822c8432a16c653b7892087f85f8705f9a301c.exe
Files
-
2132fe6374ea09d4a72b4776d3822c8432a16c653b7892087f85f8705f9a301c.exe.exe windows:21 windows x64 arch:x64
556d02ded74df9687af408e338961eb9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
QueryPerformanceFrequency
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
SetLastError
FormatMessageW
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
GetCurrentProcessId
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
SleepEx
VerSetConditionMask
VerifyVersionInfoW
CreateFileA
GetFileSizeEx
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
HeapSize
GetTimeZoneInformation
DeleteFileW
CreateToolhelp32Snapshot
TerminateProcess
VirtualAlloc
lstrlenW
GetCurrentProcess
VirtualFree
VirtualProtect
Process32First
GetModuleFileNameA
WriteConsoleW
GetStringTypeW
LoadLibraryExW
RaiseException
RtlPcToFileHeader
RtlUnwindEx
DeleteCriticalSection
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFullPathNameW
GetCurrentDirectoryW
SetEndOfFile
SetStdHandle
FlushFileBuffers
HeapReAlloc
GetFileAttributesExW
CreateProcessW
WaitForSingleObject
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapFree
HeapAlloc
GetConsoleOutputCP
ReadConsoleW
InitializeSListHead
GetConsoleMode
WriteFile
GetModuleFileNameW
SetFilePointerEx
FreeLibraryAndExitThread
ExitThread
CreateThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetTickCount
QueryPerformanceCounter
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetExitCodeProcess
AllocConsole
CreateProcessA
GetProcAddress
CloseHandle
Process32Next
LoadLibraryA
GetLastError
GetProcessHeap
Sleep
GetSystemTimeAsFileTime
GetCurrentThreadId
GetModuleHandleW
GetStartupInfoW
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
CreateFileW
GetModuleHandleExW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
ExitProcess
user32
ShowWindow
MessageBoxA
EnumWindows
GetWindowThreadProcessId
winspool.drv
OpenPrinterA
ClosePrinter
advapi32
CryptCreateHash
OpenProcessToken
LookupPrivilegeValueA
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
GetTokenInformation
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
AdjustTokenPrivileges
shell32
ShellExecuteExA
ole32
CoCreateInstance
normaliz
IdnToAscii
IdnToUnicode
ws2_32
getpeername
sendto
recvfrom
freeaddrinfo
getaddrinfo
recv
gethostname
htonl
getsockname
connect
bind
accept
select
__WSAFDIsSet
socket
htons
WSAIoctl
setsockopt
WSACleanup
WSAStartup
WSASetLastError
ntohs
WSAGetLastError
closesocket
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
getsockopt
ioctlsocket
listen
wldap32
ord200
ord30
ord79
ord35
ord33
ord32
ord301
ord26
ord22
ord41
ord45
ord60
ord211
ord46
ord217
ord143
ord27
ord50
crypt32
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
sensapi
IsDestinationReachableA
IsNetworkAlive
IsDestinationReachableW
avicap32
capCreateCaptureWindowA
netapi32
NetShareEnum
bcrypt
BCryptGenRandom
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 136B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ