Static task
static1
Behavioral task
behavioral1
Sample
fc86f19548ec0ba3a1b6af635ead31765397d8b15ab40520eb288678fb3ed7c0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fc86f19548ec0ba3a1b6af635ead31765397d8b15ab40520eb288678fb3ed7c0.exe
Resource
win10v2004-20230220-en
General
-
Target
fc86f19548ec0ba3a1b6af635ead31765397d8b15ab40520eb288678fb3ed7c0
-
Size
2.3MB
-
MD5
6e40a4813bc0edacc557768871fcb56e
-
SHA1
003350dfcf302b27b2679d3bd5c5a5da489d6e96
-
SHA256
fc86f19548ec0ba3a1b6af635ead31765397d8b15ab40520eb288678fb3ed7c0
-
SHA512
610fcd968dffee5735c9fd008b7fd4e4a72730ebe7261fd694bbdb2fc2136e759a335c14c2b8aa8964f5deed1afe74d146797dc52487c175afbfa0bb47183fc4
-
SSDEEP
49152:rQWpFXdnefDaG6DDMYDE1K14zzhUxAO2Qivo3OMbyPlmSeY:UwNefG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc86f19548ec0ba3a1b6af635ead31765397d8b15ab40520eb288678fb3ed7c0
Files
-
fc86f19548ec0ba3a1b6af635ead31765397d8b15ab40520eb288678fb3ed7c0.exe windows x64
a5d9c2ce025206d93665949648b5e519
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WriteConsoleW
SetEndOfFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
SetEnvironmentVariableA
HeapSize
IsDebuggerPresent
WriteFile
ReadFile
FreeLibrary
GetProcAddress
HeapFree
GetProcessHeap
GetModuleHandleA
GetLastError
WideCharToMultiByte
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwindEx
RtlPcToFileHeader
RaiseException
LoadLibraryExW
CreateFileW
GetDriveTypeW
GetFileType
CloseHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapAlloc
HeapReAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
GetTimeZoneInformation
user32
EnumChildWindows
rpcrt4
UuidFromStringA
Sections
.text Size: 1002KB - Virtual size: 1002KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 521KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ