Static task
static1
Behavioral task
behavioral1
Sample
a968672bb8c2382b25e1edd785888670N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a968672bb8c2382b25e1edd785888670N.exe
Resource
win10v2004-20240802-en
General
-
Target
a968672bb8c2382b25e1edd785888670N.exe
-
Size
285KB
-
MD5
a968672bb8c2382b25e1edd785888670
-
SHA1
21896f07e65a0877f2987ccc0b7d2cb0b3e16b68
-
SHA256
03c947dbba268179c9c0a8f390984cd0bbc3a6c9820654bee6b3e1dfe78eb4ac
-
SHA512
edd532a6f7b95a1197dfbb859b196e0f59b442aea530632387de6b6bc9dac8389553b08aa59173cebbc70885b4eef17528a7d339a2d5b6117efa962605b7ba60
-
SSDEEP
3072:NMrwREswTsKc1dBXDxwdvyovGbeDfctRGzAHvJxXvNri4faMr/fVaI7cbxXz5ieJ:xRRwIKc1dBEK2fDf+RGzAGlP5Irqj4K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a968672bb8c2382b25e1edd785888670N.exe
Files
-
a968672bb8c2382b25e1edd785888670N.exe.exe windows:5 windows x86 arch:x86
4259acbec86a418fa374499fea851ee4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
PathAppendA
PathFileExistsW
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
ws2_32
htonl
htons
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
setupapi
CM_Get_Device_IDA
SetupDiCallClassInstaller
CM_Get_Parent
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
CM_Reenumerate_DevNode
CM_Locate_DevNodeA
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiGetDeviceInstallParamsA
kernel32
GetProcessHeap
Sleep
CreateProcessA
CreateToolhelp32Snapshot
Process32First
ProcessIdToSessionId
Process32Next
OpenProcess
VerSetConditionMask
VerifyVersionInfoA
GetFileAttributesW
SetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
CreateDirectoryW
CopyFileW
FindClose
CreateDirectoryA
RemoveDirectoryW
GetDiskFreeSpaceA
GetLogicalDriveStringsA
GetDriveTypeA
Process32FirstW
Process32NextW
DeviceIoControl
GetCommandLineA
lstrcmpiA
OutputDebugStringA
CreateSemaphoreA
LocalFree
SetEvent
InterlockedIncrement
InterlockedDecrement
LocalAlloc
SetConsoleCtrlHandler
GetExitCodeProcess
CreateEventA
CreateThread
GetTickCount
WaitForMultipleObjects
ResetEvent
FindFirstFileA
GetPrivateProfileStringA
TerminateProcess
GetLocalTime
GetTempPathA
GetFileSize
DeleteFileA
GetFileAttributesA
SetFileAttributesA
CopyFileA
Thread32First
Thread32Next
GetVolumeNameForVolumeMountPointA
lstrlenA
FindNextFileA
GetWindowsDirectoryA
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
ReadFile
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetFileType
SetLastError
GetCurrentProcess
HeapFree
HeapAlloc
LoadLibraryA
CreateFileA
FreeLibrary
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
WaitForSingleObject
CloseHandle
GetLastError
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetCurrentThreadId
SetHandleCount
HeapSize
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
WriteFile
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetStartupInfoA
RaiseException
RtlUnwind
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetModuleHandleW
ExitProcess
user32
CharNextA
GetMessageA
DispatchMessageA
UnregisterDeviceNotification
PostThreadMessageA
RegisterDeviceNotificationA
wsprintfA
advapi32
RegCreateKeyExA
GetUserNameA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
QueryServiceStatus
UnlockServiceDatabase
ChangeServiceConfigA
QueryServiceLockStatusA
LockServiceDatabase
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerExA
SetServiceStatus
CloseServiceHandle
DeleteService
ControlService
StartServiceA
ChangeServiceConfig2A
CreateServiceA
QueryServiceConfigA
OpenServiceA
OpenSCManagerA
CreateProcessAsUserA
OpenProcessToken
DuplicateTokenEx
SetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueA
ConvertStringSecurityDescriptorToSecurityDescriptorA
shell32
ShellExecuteA
SHCreateDirectoryExA
SHGetFolderPathA
Sections
.text Size: 189KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE