Static task
static1
Behavioral task
behavioral1
Sample
485b083fdaca55d177d1c6a1923077509bf29269eb62405609af2ad786bf1c19.exe
Resource
win7-20241023-en
General
-
Target
485b083fdaca55d177d1c6a1923077509bf29269eb62405609af2ad786bf1c19
-
Size
1.2MB
-
MD5
143127f98918b3d96de0c37675e99bf8
-
SHA1
c1c9bd02abb683e854310f3f6dc34a9dd9948c40
-
SHA256
485b083fdaca55d177d1c6a1923077509bf29269eb62405609af2ad786bf1c19
-
SHA512
9ba9349fcc35f7098da03d18f086895ebd9253da33099d4bcee388cc6deebb36160df0adb2b950b9f4399344bc5cc4d81c879263e706974b2c30495129a750bb
-
SSDEEP
12288:m61PUJjbEUN08GPLnRLwAdwA1jJVoz7jnGa42IXEbh1nqoSUxwrBKvinWxuR3swM:mGUJc/F0vGaQ2jnqoSUxwKiy2cKkv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 485b083fdaca55d177d1c6a1923077509bf29269eb62405609af2ad786bf1c19
Files
-
485b083fdaca55d177d1c6a1923077509bf29269eb62405609af2ad786bf1c19.exe windows:5 windows x86 arch:x86
92c9c1720b27121dbd404825521d44bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DecodePointer
GetProcAddress
GetModuleHandleW
FreeLibrary
InterlockedIncrement
lstrcmpiW
LoadLibraryExW
GetFullPathNameW
GetCurrentDirectoryW
FindResourceW
LoadResource
RaiseException
GetLastError
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
InterlockedDecrement
SizeofResource
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FreeLibraryAndExitThread
ExitThread
ExpandEnvironmentStringsW
PeekNamedPipe
WaitForMultipleObjects
GetSystemDirectoryA
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
GetTickCount
GetTempPathW
GetLongPathNameW
CreateFileW
CopyFileW
WriteFile
MoveFileExW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
GetFileSize
ReadFile
WideCharToMultiByte
LoadLibraryW
GetPrivateProfileIntW
WritePrivateProfileStringW
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
OpenProcess
MoveFileW
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetSystemDirectoryW
FindClose
lstrcpyW
FindFirstFileW
FindNextFileW
GetVolumeInformationW
GetSystemInfo
FormatMessageW
GetVersionExW
ReleaseMutex
CreateMutexW
CreateDirectoryW
VirtualProtect
SetErrorMode
GetLocalTime
DeviceIoControl
OutputDebugStringA
SetPriorityClass
VirtualAlloc
VirtualFree
SetLastError
GetNativeSystemInfo
LoadLibraryA
IsBadReadPtr
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
RtlUnwind
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetStringTypeW
GetFileType
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
WriteConsoleW
SetEndOfFile
SleepEx
DeleteFileW
GetCurrentProcessId
CreateThread
CloseHandle
TerminateThread
SetEvent
Sleep
GetExitCodeThread
CreateEventW
WaitForSingleObject
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
ReadProcessMemory
GetPrivateProfileStringW
user32
wsprintfW
CharNextW
advapi32
RegOpenKeyW
RegEnumKeyW
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetTokenInformation
GetTokenInformation
OpenProcessToken
RegQueryValueExW
ImpersonateLoggedOnUser
RevertToSelf
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegDeleteValueW
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoUninitialize
oleaut32
VarUI4FromStr
shlwapi
PathRemoveFileSpecW
PathFileExistsW
urlmon
URLDownloadToFileW
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
iphlpapi
GetAdaptersInfo
wininet
InternetCloseHandle
HttpQueryInfoW
InternetOpenUrlW
InternetOpenW
InternetReadFile
InternetSetOptionW
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ws2_32
listen
sendto
recvfrom
select
__WSAFDIsSet
ioctlsocket
gethostname
accept
WSAStartup
WSACleanup
closesocket
socket
WSAGetLastError
recv
send
bind
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
WSASetLastError
htonl
inet_addr
inet_ntoa
gethostbyaddr
gethostbyname
getservbyport
getservbyname
Sections
.text Size: 528KB - Virtual size: 527KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 425KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 100KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE