Static task
static1
Behavioral task
behavioral1
Sample
60daf83af82d0c8f30b2768566b21751daaa2852d3b6b6bbdc0cae97d7065a12.exe
Resource
win7-20240903-en
General
-
Target
60daf83af82d0c8f30b2768566b21751daaa2852d3b6b6bbdc0cae97d7065a12
-
Size
2.5MB
-
MD5
d867901da14fb2313656d0effa7d296a
-
SHA1
1acad8688a3e4bd3a95d758db84ed0621ccf37cc
-
SHA256
60daf83af82d0c8f30b2768566b21751daaa2852d3b6b6bbdc0cae97d7065a12
-
SHA512
cad72fc83926a525fc93b52b9d7ca0990ab1e8be73a322cc828d04d1284a0e830909c6f517512f97e31875d704900fb61ae83179665b3236442aefaaedb01bb3
-
SSDEEP
49152:92fHdU5fhxYukMQqgIqQuZGsxhdqPawdtNQHnq/oBNHQ/H:9yHdU5fhNkiXJuZGqFwd0IH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 60daf83af82d0c8f30b2768566b21751daaa2852d3b6b6bbdc0cae97d7065a12
Files
-
60daf83af82d0c8f30b2768566b21751daaa2852d3b6b6bbdc0cae97d7065a12.exe windows:5 windows x86 arch:x86
8a46dabaed38ccda6b17ea886534a310
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DecodePointer
GetModuleHandleW
InterlockedIncrement
lstrcmpiW
LoadLibraryExW
HeapReAlloc
HeapSize
GetFileSize
ReadFile
CreateFileW
WideCharToMultiByte
WriteFile
FindClose
FileTimeToSystemTime
lstrcpyW
GetTempPathW
GetFileAttributesW
GetFileAttributesExW
DeleteFileW
FindFirstFileW
FindNextFileW
CopyFileW
MoveFileExW
GetTickCount
LoadLibraryW
GetPrivateProfileIntW
GetLongPathNameW
GetEnvironmentVariableW
GetDriveTypeW
GetSystemDirectoryW
CreateDirectoryW
WTSGetActiveConsoleSessionId
LocalFree
GetCurrentProcess
GetCurrentThreadId
GetSystemInfo
GetVolumeInformationW
GetVersionExW
ReleaseMutex
CreateMutexW
GlobalAlloc
GlobalFree
LocalAlloc
RaiseException
TerminateProcess
GetExitCodeProcess
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
ReadProcessMemory
DeviceIoControl
OutputDebugStringA
SetPriorityClass
FindResourceW
GetLastError
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
InterlockedDecrement
SizeofResource
SetEndOfFile
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
GetCurrentProcessId
DeleteCriticalSection
CreateThread
SetEvent
Sleep
CreateEventW
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
MapViewOfFile
CloseHandle
FlushViewOfFile
UnmapViewOfFile
OpenFileMappingW
IsBadReadPtr
FreeLibrary
GetProcessHeap
GetProcAddress
HeapAlloc
GetNativeSystemInfo
LoadLibraryA
VirtualAlloc
FlushFileBuffers
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
GetACP
SetConsoleCtrlHandler
ExitProcess
SetFilePointerEx
SystemTimeToTzSpecificLocalTime
ExitThread
RtlUnwind
LoadResource
lstrlenW
VirtualFree
SetLastError
HeapFree
VirtualProtect
GetPrivateProfileStringW
OpenProcess
WritePrivateProfileStringW
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SystemTimeToFileTime
GetSystemTime
ReadConsoleW
ReadConsoleA
SetConsoleMode
GetConsoleMode
ConvertThreadToFiber
ConvertFiberToThread
CreateFiber
DeleteFiber
SwitchToFiber
GetModuleHandleExW
VerifyVersionInfoA
GetSystemDirectoryA
GetModuleHandleA
VerSetConditionMask
ExpandEnvironmentStringsA
PeekNamedPipe
GetStdHandle
GetFileType
WaitForMultipleObjects
SleepEx
FormatMessageA
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
GetCurrentThread
QueryPerformanceCounter
SwitchToThread
user32
wsprintfW
CharNextW
LoadStringW
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
advapi32
InitializeSecurityDescriptor
RegisterEventSourceW
DeregisterEventSource
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
RegDeleteValueW
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyW
CreateProcessAsUserW
SetTokenInformation
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
ReportEventW
GetTokenInformation
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegQueryValueExW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
shell32
SHGetFolderPathW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
oleaut32
VarUI4FromStr
shlwapi
PathAddBackslashW
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
wldap32
ord301
ord26
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord22
ord41
ord50
ord60
ord211
ord46
ord143
ws2_32
ntohs
setsockopt
socket
getpeername
gethostname
accept
ioctlsocket
WSAIoctl
getaddrinfo
getsockname
freeaddrinfo
recvfrom
sendto
listen
htons
WSAStartup
WSACleanup
recv
send
WSAGetLastError
__WSAFDIsSet
select
WSASetLastError
bind
closesocket
connect
getsockopt
wtsapi32
WTSQueryUserToken
wininet
InternetQueryOptionW
HttpQueryInfoW
InternetCloseHandle
InternetSetOptionW
InternetOpenUrlW
InternetReadFile
InternetOpenW
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 534KB - Virtual size: 533KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 145KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE