Static task
static1
Behavioral task
behavioral1
Sample
44e1599a973d4784bd9f7c8b5e737e23e0657c16d8bc3e111f065e475e03a0f4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44e1599a973d4784bd9f7c8b5e737e23e0657c16d8bc3e111f065e475e03a0f4.exe
Resource
win10v2004-20240802-en
General
-
Target
44e1599a973d4784bd9f7c8b5e737e23e0657c16d8bc3e111f065e475e03a0f4
-
Size
396KB
-
MD5
026f3169c614b6d5938b8b00a8e2e2be
-
SHA1
5a0b6e9f9c93d23e1b0dd62c855b29a193ba881e
-
SHA256
44e1599a973d4784bd9f7c8b5e737e23e0657c16d8bc3e111f065e475e03a0f4
-
SHA512
97c1404819b3962183dd765a1a1da2a753e970a3536f0941071908628a4901d214662c21c2d42cdf3aa265e89d040824117b3e4264eb5f780a154b191ce5b27b
-
SSDEEP
12288:sk7Ma0SF2e9gOq+/aVADQ6wVnmtRh/hiA2:n7MabF2e9Tq+/aqDTmmP/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44e1599a973d4784bd9f7c8b5e737e23e0657c16d8bc3e111f065e475e03a0f4
Files
-
44e1599a973d4784bd9f7c8b5e737e23e0657c16d8bc3e111f065e475e03a0f4.exe windows:6 windows x64 arch:x64
dc031860ccb18be8cace8c958e66ddc8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
accept
htons
ntohl
htonl
bind
closesocket
WSAAddressToStringA
sendto
recvfrom
getsockname
WSASocketA
WSAEventSelect
WSACreateEvent
shutdown
WSASetLastError
WSACleanup
getservbyname
getservbyport
gethostbyaddr
ntohs
freeaddrinfo
getaddrinfo
WSADuplicateSocketA
WSAGetLastError
WSAStartup
gethostbyname
socket
setsockopt
send
select
recv
listen
inet_ntoa
inet_addr
connect
crypt32
CryptImportPublicKeyInfo
CertGetCertificateContextProperty
CryptDecodeObjectEx
wininet
InternetConnectW
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetReadFile
HttpOpenRequestW
HttpQueryInfoW
HttpSendRequestW
InternetCrackUrlW
winhttp
WinHttpOpen
WinHttpGetIEProxyConfigForCurrentUser
WinHttpReadData
WinHttpConnect
WinHttpCloseHandle
WinHttpQueryOption
WinHttpSetOption
WinHttpGetProxyForUrl
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpCrackUrl
mpr
WNetGetUniversalNameA
netapi32
NetWkstaGetInfo
psapi
GetDeviceDriverBaseNameW
GetDeviceDriverFileNameW
EnumDeviceDrivers
iphlpapi
GetUdpTable
GetTcpTable
GetIpNetTable
GetIpAddrTable
GetIfEntry
GetIpInterfaceEntry
DeleteIpForwardEntry
CreateIpForwardEntry
GetIpForwardTable
shlwapi
SHDeleteKeyW
kernel32
QueryPerformanceCounter
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
RtlVirtualUnwind
RtlLookupFunctionEntry
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
UnhandledExceptionFilter
RtlCaptureContext
EnterCriticalSection
CloseHandle
GetLastError
SetLastError
SetUnhandledExceptionFilter
Sleep
ExitProcess
ExitThread
GetSystemTime
SystemTimeToFileTime
LocalFree
GetVolumeInformationW
WriteFile
GetSystemDirectoryW
GetComputerNameW
CreateRemoteThread
GetThreadId
GetModuleHandleA
GetProcAddress
WaitForMultipleObjects
ReadFile
ConnectNamedPipe
GetOverlappedResult
ResetEvent
CreateEventW
GetCurrentProcess
TlsGetValue
LocalAlloc
CreateNamedPipeA
GetCurrentProcessId
GetCurrentThreadId
FreeLibrary
SetHandleInformation
GlobalFree
LeaveCriticalSection
ReleaseMutex
WaitForSingleObject
CreateMutexW
CreateThread
TerminateThread
ResumeThread
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapFree
GetProcessHeap
FindClose
FindFirstFileW
FindNextFileW
GetDriveTypeW
GetLogicalDrives
FileTimeToSystemTime
GetSystemDefaultLCID
GetDiskFreeSpaceExA
GetDriveTypeA
GetLogicalDriveStringsA
GetEnvironmentVariableW
GetCurrentThread
OpenProcess
GetLocalTime
GetComputerNameA
GetTimeZoneInformation
GetLocaleInfoA
CreatePipe
PeekNamedPipe
TerminateProcess
SetEndOfFile
GetSystemDirectoryA
GetVersionExA
FormatMessageA
ExpandEnvironmentStringsW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
DeleteFileW
GetFileAttributesW
GetFileAttributesExW
RemoveDirectoryW
SetFileAttributesW
lstrcmpiW
lstrcpyW
lstrlenW
CopyFileW
MoveFileW
ReadProcessMemory
TlsSetValue
TlsFree
LoadLibraryExW
RtlUnwind
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapReAlloc
EncodePointer
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetEvent
TlsAlloc
GetFileType
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleOutputCP
GetFileSizeEx
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
FlushFileBuffers
CreateFileW
HeapSize
WriteConsoleW
LoadLibraryA
CreateProcessW
user32
GetThreadDesktop
GetProcessWindowStation
GetUserObjectInformationA
ExitWindowsEx
wsprintfW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CoCreateGuid
advapi32
RegLoadKeyW
RegEnumKeyW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegConnectRegistryW
RegCloseKey
CreateProcessAsUserW
ConvertSidToStringSidA
LookupPrivilegeValueA
LookupAccountSidW
RevertToSelf
GetTokenInformation
DuplicateTokenEx
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptAcquireContextW
OpenThreadToken
SetEntriesInAclW
LookupPrivilegeValueW
SetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
InitializeAcl
AllocateAndInitializeSid
AdjustTokenPrivileges
OpenProcessToken
CryptDuplicateKey
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptSetKeyParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
ImpersonateLoggedOnUser
RegOpenKeyExW
RegQueryInfoKeyA
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
RegUnLoadKeyW
ClearEventLogA
CloseEventLog
GetNumberOfEventLogRecords
GetOldestEventLogRecord
OpenEventLogA
ReadEventLogA
RegEnumValueW
Sections
.text Size: 281KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ