Static task
static1
Behavioral task
behavioral1
Sample
f104365d9d691369911b38002c19e70d462a50a243a35bca970cc00f80040f52.exe
Resource
win10v2004-20230221-en
General
-
Target
f104365d9d691369911b38002c19e70d462a50a243a35bca970cc00f80040f52
-
Size
269KB
-
MD5
df8ab976221bbbd5d47dccd29ce378d3
-
SHA1
8c0531eaec62fa6c7f18befcd2732d88b968c8de
-
SHA256
f104365d9d691369911b38002c19e70d462a50a243a35bca970cc00f80040f52
-
SHA512
a59a54f8158e7056fa8cea984947fcf5575b59daa278d9ef9e959885bf3212d825a781686d454845c311ccd09dca7c7931de5942317ea9eb94a215e7a7e724c8
-
SSDEEP
3072:j6duWNYGxL5I28FNGkEcjfui1KmAtiozXjmc7phUN6V+52cFrmcJObl+G44:ouWnLq28CkEcKVTiaXd7MN67cFrBSg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f104365d9d691369911b38002c19e70d462a50a243a35bca970cc00f80040f52
Files
-
f104365d9d691369911b38002c19e70d462a50a243a35bca970cc00f80040f52.exe windows x86
8507dd6e83303e4881d265378980e13b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetComputerNameW
SetEvent
SetTapeParameters
GetModuleHandleW
GetNumberFormatA
ReadConsoleW
FatalAppExitW
GetCalendarInfoW
HeapCreate
GetConsoleAliasW
LocalReAlloc
ReplaceFileW
GetModuleFileNameW
CreateActCtxA
lstrlenW
GlobalUnlock
GetStringTypeExA
GetLastError
IsDBCSLeadByteEx
SetLastError
GetProcAddress
VirtualAlloc
ReadFileEx
InterlockedCompareExchange
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
DnsHostnameToComputerNameA
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
BeginUpdateResourceA
GetModuleHandleA
QueryMemoryResourceNotification
GetProcessAffinityMask
GetConsoleTitleW
GetConsoleCursorInfo
OpenEventW
SetProcessShutdownParameters
FindAtomW
GetWindowsDirectoryW
AddConsoleAliasA
GetTempPathA
EnumCalendarInfoExA
FindNextVolumeA
EnumSystemLocalesW
LCMapStringW
GetLogicalDriveStringsW
WriteConsoleOutputW
GetDefaultCommConfigW
TlsGetValue
SetThreadContext
GetConsoleAliasesLengthW
GetTempFileNameA
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
MultiByteToWideChar
GetStartupInfoW
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
VirtualFree
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
LCMapStringA
WideCharToMultiByte
user32
DdeQueryStringW
GetClassInfoExW
CreateAcceleratorTableA
ChangeMenuW
gdi32
GetCharABCWidthsI
GetCharABCWidthsFloatW
GetCharWidthW
EnumFontsA
advapi32
BackupEventLogA
Sections
.text Size: 158KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 4.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ