Static task
static1
Behavioral task
behavioral1
Sample
21f88b697a09920cff8e006f16c4ff42b22cedbe894c8f0a0c381ef2f8f393ca.exe
Resource
win10v2004-20230220-en
General
-
Target
21f88b697a09920cff8e006f16c4ff42b22cedbe894c8f0a0c381ef2f8f393ca
-
Size
824KB
-
MD5
d6909d40f253b44b4269093760c0a9fa
-
SHA1
3427f239d05c4e7d965b6dbf476ac02732fe4453
-
SHA256
21f88b697a09920cff8e006f16c4ff42b22cedbe894c8f0a0c381ef2f8f393ca
-
SHA512
3fe81ef5a7bc8bd3292f01634795098c5ff4f3ce2b6bd98a69ec5e3c7e61db75575575b3e19312bdb4de324401783ececdc4bff6d1ccb3ec4c0922b472a1930b
-
SSDEEP
12288:PSKlpaSVIm2VujnZ6OU0ZmoTRxjjEVBjqwDguOFt9Z2lfAL+3gugJ:PSKWw1YOLZm8HkRjDgX/O0MgugJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 21f88b697a09920cff8e006f16c4ff42b22cedbe894c8f0a0c381ef2f8f393ca
Files
-
21f88b697a09920cff8e006f16c4ff42b22cedbe894c8f0a0c381ef2f8f393ca.exe windows x86
38174083713e590cf897cdb95c1ddaa8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
SetMailslotInfo
GetLogicalDriveStringsW
WritePrivateProfileSectionA
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
WaitNamedPipeW
EnumTimeFormatsW
SetProcessPriorityBoost
GetVolumePathNameW
GetPrivateProfileIntA
GetPrivateProfileStructW
GetSystemPowerStatus
GetCalendarInfoA
GetProcessHandleCount
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetFileAttributesA
GetFileAttributesW
GetModuleFileNameW
GetProcAddress
MoveFileW
SetComputerNameA
SearchPathA
ConvertThreadToFiber
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
DeleteTimerQueue
MoveFileA
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
GetDiskFreeSpaceA
OpenJobObjectW
FindFirstVolumeMountPointA
EnumDateFormatsA
GetModuleHandleA
FindNextFileW
GetStringTypeW
GetConsoleTitleW
EnumDateFormatsW
CompareStringA
GetShortPathNameW
SetCalendarInfoA
SetThreadAffinityMask
SetFileShortNameA
FindAtomW
GetVolumeNameForVolumeMountPointW
DeleteFileW
EnumSystemLocalesW
AreFileApisANSI
GetDriveTypeW
OpenWaitableTimerA
CreateMutexW
WideCharToMultiByte
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetLastError
HeapFree
DeleteFileA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
LoadLibraryW
WriteConsoleW
CreateFileW
CloseHandle
gdi32
GetCharABCWidthsW
SelectObject
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 588KB - Virtual size: 41.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ