Static task
static1
Behavioral task
behavioral1
Sample
14670654db9b767632fc57606d44fae7821baa60b85c4d4882784072dc536e73.exe
Resource
win7-20240729-en
General
-
Target
14670654db9b767632fc57606d44fae7821baa60b85c4d4882784072dc536e73
-
Size
1.4MB
-
MD5
789e769ce9e544abee35a62420371d8f
-
SHA1
f1410949763c9386ff07b18e852a02bbeb3d7017
-
SHA256
14670654db9b767632fc57606d44fae7821baa60b85c4d4882784072dc536e73
-
SHA512
8a16f24eca845840a5213e4ed8c8812d2c09bba7f37e0d42a49788bc98633e8e46cd9cb69e3c9ee2616ff87cfa2fe15c794cd9099e363b2be39ed16184b84a08
-
SSDEEP
24576:HPhKDEa9xALCk5tIx8Eh6cy0UwPEnLW6pJTTnTTXTTgTTkTToTT6TTBTTTuTTWTI:HPva9xALCk5iucWYmW6pJTTnTTXTTgT9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14670654db9b767632fc57606d44fae7821baa60b85c4d4882784072dc536e73
Files
-
14670654db9b767632fc57606d44fae7821baa60b85c4d4882784072dc536e73.exe windows:6 windows x86 arch:x86
17459ac4ce5be9393f026490ac599246
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
DeleteFileW
WriteFile
GetCurrentProcess
ReadProcessMemory
OutputDebugStringA
ExitProcess
TerminateProcess
GetExitCodeProcess
VirtualProtectEx
VirtualQueryEx
VirtualFree
LoadLibraryExA
FlushInstructionCache
VirtualAlloc
RtlUnwind
SetEndOfFile
InterlockedDecrement
InterlockedIncrement
OpenFileMappingW
GetVersionExW
InterlockedExchangeAdd
ReleaseMutex
GetPrivateProfileStringA
LoadLibraryW
GetModuleFileNameA
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
OpenProcess
CreateProcessW
ResumeThread
IsBadReadPtr
lstrcmpiW
LoadLibraryExW
GetProcAddress
GetModuleHandleW
CreateFileA
GetSystemDirectoryW
GetModuleFileNameW
FreeLibrary
VirtualProtect
GetCurrentThreadId
GetCurrentProcessId
WaitForSingleObject
SetLastError
SetUnhandledExceptionFilter
CreateMutexW
GetFileSizeEx
EnterCriticalSection
InitializeCriticalSection
GetCommandLineW
DecodePointer
UnregisterWait
RegisterWaitForSingleObject
CreateFileW
CloseHandle
MultiByteToWideChar
FindNextFileW
FindFirstFileW
FindClose
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
GetEnvironmentVariableW
DeleteCriticalSection
InitializeCriticalSectionEx
LocalFree
QueryPerformanceCounter
GetStartupInfoW
lstrcmpiA
lstrcmpA
DeviceIoControl
GetSystemWindowsDirectoryW
FreeResource
Sleep
InterlockedCompareExchange
WriteConsoleW
ReadConsoleW
SetStdHandle
UnhandledExceptionFilter
FlushFileBuffers
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
SetEnvironmentVariableW
GetProcessHeap
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FreeLibraryAndExitThread
ExitThread
CreateThread
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
SetFilePointerEx
GetFileType
GetStdHandle
GetModuleHandleExW
LeaveCriticalSection
WideCharToMultiByte
GetStringTypeW
FormatMessageW
EncodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
InitializeSListHead
GetFileAttributesExW
user32
GetIconInfo
UnregisterClassW
PostMessageW
SendMessageTimeoutW
FindWindowW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
DefWindowProcW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
DestroyWindow
CharNextW
LoadCursorW
RegisterWindowMessageW
PostQuitMessage
CallWindowProcW
IsWindow
wsprintfW
SetTimer
KillTimer
GetSystemMetrics
GetDC
ReleaseDC
GetWindowLongW
SetWindowLongW
MonitorFromWindow
SetWindowTextW
gdi32
GetDeviceCaps
DeleteDC
SetBkColor
CreateDIBSection
GetObjectW
ExtTextOutW
BitBlt
CreateCompatibleDC
DeleteObject
SelectObject
advapi32
RegQueryValueExA
RegEnumKeyExA
RegQueryValueExW
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyExA
shell32
ShellExecuteW
ShellExecuteExW
ExtractIconExW
ole32
CoUninitialize
CoCreateGuid
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
oleaut32
VarUI4FromStr
shlwapi
PathFindExtensionW
PathFindFileNameW
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
SHGetValueW
PathAppendA
PathFileExistsA
PathIsDirectoryW
PathCombineW
StrStrIW
StrStrIA
StrCmpIW
StrCmpNIW
StrTrimA
SHGetValueA
SHSetValueA
PathRemoveFileSpecA
comctl32
InitCommonControlsEx
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
crypt32
CertGetNameStringW
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
Sections
.text Size: 591KB - Virtual size: 590KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 470KB - Virtual size: 470KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 102KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE