Static task
static1
Behavioral task
behavioral1
Sample
ef42c79886c35489db1664ca73fcebb10b21359e5603e82719c8cbe4848ea2f7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef42c79886c35489db1664ca73fcebb10b21359e5603e82719c8cbe4848ea2f7.exe
Resource
win10v2004-20241007-en
General
-
Target
ef42c79886c35489db1664ca73fcebb10b21359e5603e82719c8cbe4848ea2f7
-
Size
972KB
-
MD5
7ccd3210b8a89df3bfa343e2b417845f
-
SHA1
173e3237817b83030fe1d28aed1ecf6d58b2ef9b
-
SHA256
ef42c79886c35489db1664ca73fcebb10b21359e5603e82719c8cbe4848ea2f7
-
SHA512
1e7ddae08736d082be8e301d9c9a40650ca1dd69af72eb496354c97b6c01f7e374946e2c94c377e3a72da15cc03dacf1180abc67fd2820862cd1b4052b304d6c
-
SSDEEP
24576:LTXKnfr43nHofrnpaPymIyzi4BeHCiqZJJaXC3Ttwbzk:LunfanHofrnpETDBeH8JaS3TK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef42c79886c35489db1664ca73fcebb10b21359e5603e82719c8cbe4848ea2f7
Files
-
ef42c79886c35489db1664ca73fcebb10b21359e5603e82719c8cbe4848ea2f7.exe windows:6 windows x64 arch:x64
fe1a3f85e7abc2b98cc2fc8d3f5762b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
crypt32
CertFreeCertificateChainEngine
CertFreeCertificateChain
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertGetCertificateChain
CertOpenStore
wldap32
ord211
ord46
ord143
ord60
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
ord45
ws2_32
send
recv
closesocket
accept
WSACleanup
htonl
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSASetLastError
select
__WSAFDIsSet
inet_pton
WSAGetLastError
socket
listen
ioctlsocket
ntohl
getaddrinfo
freeaddrinfo
WSACloseEvent
WSACreateEvent
WSAEnumNetworkEvents
WSAEventSelect
recvfrom
sendto
gethostname
WSAStartup
kernel32
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
HeapFree
FlushFileBuffers
HeapAlloc
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
GetCommandLineW
GetCommandLineA
ExitProcess
GetModuleFileNameW
WriteFile
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
SetStdHandle
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetCurrentConsoleFontEx
GetFileAttributesW
MultiByteToWideChar
WriteConsoleW
SetConsoleCP
SetConsoleOutputCP
GetLastError
SetLastError
FormatMessageW
QueryPerformanceCounter
GetTickCount
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
Sleep
SleepEx
QueryPerformanceFrequency
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
MoveFileExA
CloseHandle
WaitForSingleObjectEx
WideCharToMultiByte
GetEnvironmentVariableA
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
VerSetConditionMask
VerifyVersionInfoA
CreateFileA
GetFileSizeEx
RaiseException
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
DeleteFileW
HeapSize
HeapReAlloc
CreateThread
RtlPcToFileHeader
RtlUnwindEx
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
LocalFree
FormatMessageA
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
SetEndOfFile
SetFileInformationByHandle
SetFilePointerEx
GetTempPathW
AreFileApisANSI
MoveFileExW
GetFileInformationByHandleEx
GetStringTypeW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
RtlUnwind
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
CryptGenRandom
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
shell32
SHGetFolderPathW
ShellExecuteW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 693KB - Virtual size: 692KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ