Static task
static1
Behavioral task
behavioral1
Sample
1ce47354ae0bba5b98467f82611cc9cdacc7860b68d077db2a8fd0c784f1cc0c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1ce47354ae0bba5b98467f82611cc9cdacc7860b68d077db2a8fd0c784f1cc0c.exe
Resource
win10v2004-20240802-en
General
-
Target
1ce47354ae0bba5b98467f82611cc9cdacc7860b68d077db2a8fd0c784f1cc0c
-
Size
2.2MB
-
MD5
5c70032aad734ad9c46483ad1707b351
-
SHA1
fde14a416d6498a845094f20115ebab81e2d54c8
-
SHA256
1ce47354ae0bba5b98467f82611cc9cdacc7860b68d077db2a8fd0c784f1cc0c
-
SHA512
432eb2315dfa66ee321b7e6064ff5f64efcda505542631de6bbcd1be96dc7dded4f95f8b7a7869c72effcf020e07eabfb3140e658cec7e8ef440189d0367d954
-
SSDEEP
49152:0T/ggggMT1GZawv7tNhZTlgtC9jlZP8KP/hTVSdD3B+tWP:0OGZaGvXSC5MghIdDb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1ce47354ae0bba5b98467f82611cc9cdacc7860b68d077db2a8fd0c784f1cc0c
Files
-
1ce47354ae0bba5b98467f82611cc9cdacc7860b68d077db2a8fd0c784f1cc0c.exe windows:5 windows x86 arch:x86
2c06c4163b7a2a5e396b4af8a8230c12
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
FormatMessageW
WideCharToMultiByte
GetCommandLineW
LockResource
LoadResource
SizeofResource
FindResourceW
Sleep
MultiByteToWideChar
VerSetConditionMask
FindClose
GetSystemTime
GetNativeSystemInfo
GetSystemDirectoryW
FindFirstFileW
FindNextFileW
MoveFileExW
VerifyVersionInfoW
CloseHandle
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
WaitForMultipleObjects
DeleteFileW
ReleaseMutex
WaitForSingleObject
CreateMutexW
FreeLibrary
LocalFree
LoadLibraryW
GetVersionExW
GetLogicalDriveStringsW
GetEnvironmentVariableW
GetDriveTypeW
CreateDirectoryW
GetCurrentProcess
GetFileSize
WriteFile
ReadFile
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateFileA
CreateFileW
MoveFileW
VirtualQuery
InitializeCriticalSection
TlsAlloc
GetSystemDirectoryA
OpenProcess
FindResourceExW
SetEvent
LocalAlloc
TerminateProcess
VirtualAlloc
VirtualFree
VirtualProtect
LoadLibraryA
TlsFree
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
EncodePointer
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlUnwind
GetTimeZoneInformation
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
ExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
GetACP
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStringTypeW
ReadConsoleW
GetFileAttributesExW
SetStdHandle
SetEndOfFile
WriteConsoleW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
FlushFileBuffers
SwitchToThread
CreateEventW
SetLastError
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentThreadId
TryEnterCriticalSection
TlsSetValue
ReadConsoleA
SetConsoleMode
SwitchToFiber
DeleteFiber
CreateFiber
GlobalMemoryStatus
ConvertFiberToThread
ConvertThreadToFiber
SystemTimeToFileTime
IsBadReadPtr
TlsGetValue
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
IsDebuggerPresent
GetModuleFileNameW
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DeviceIoControl
DecodePointer
GetFullPathNameW
GetCurrentDirectoryW
PeekNamedPipe
GetEnvironmentVariableA
CompareFileTime
SleepEx
user32
DefWindowProcW
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
advapi32
CryptCreateHash
RegCreateKeyExW
LookupAccountSidW
GetTokenInformation
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExW
OpenProcessToken
RegOpenKeyExW
RegSetValueExW
CryptGenRandom
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
RegCloseKey
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
ReportEventW
GetUserNameW
RegisterEventSourceW
DeregisterEventSource
SetEntriesInAclW
ole32
CoUninitialize
CoInitialize
shlwapi
SHDeleteKeyW
PathFindFileNameW
PathFileExistsW
PathCombineW
PathRemoveFileSpecW
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
psapi
GetProcessImageFileNameW
EnumProcesses
urlmon
ObtainUserAgentString
shell32
CommandLineToArgvW
SHGetFolderPathW
crypt32
CertFindCertificateInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertFreeCertificateContext
CertCloseStore
CertOpenStore
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreW
CertEnumCertificatesInStore
ws2_32
sendto
recvfrom
WSAEventSelect
WSAEnumNetworkEvents
gethostname
WSACloseEvent
freeaddrinfo
getaddrinfo
select
send
__WSAFDIsSet
ioctlsocket
recv
listen
htonl
accept
closesocket
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSAGetLastError
getnameinfo
WSACreateEvent
shutdown
wldap32
ord147
ord133
ord79
ord142
ord167
ord127
ord27
ord26
ord117
ord301
ord145
ord219
ord46
ord14
ord216
ord208
ord41
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 477KB - Virtual size: 476KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 145KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE