Static task
static1
Behavioral task
behavioral1
Sample
f5f72e8f84bd2a686061512db210e897.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f5f72e8f84bd2a686061512db210e897.exe
Resource
win10v2004-20230220-en
General
-
Target
f5f72e8f84bd2a686061512db210e897.exe
-
Size
534KB
-
MD5
f5f72e8f84bd2a686061512db210e897
-
SHA1
bf0c446488eba348245e0140c06787c3cb0d20fe
-
SHA256
2821371cf46ca8a97424f09d0bcf1e55cb4e89afd8c903acd1f6d917fa0c5963
-
SHA512
e271f278eaa867399ce5a374208805afe81735e74a48bfa1ea6ff4dfe4305cf5d297f2394ebc4e2e7a95b263d2b4fc91ec865f51fc11923e1e891bd8a8c38499
-
SSDEEP
6144:O/cEs4P86/FN5NCEJorHZOejtypxaXPCGhPU2GgtlZuZ1iYj1WxLMDowQhf0RHmJ:+ls6/V8HPjwyBPDpBuiK6LM9Ry
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5f72e8f84bd2a686061512db210e897.exe
Files
-
f5f72e8f84bd2a686061512db210e897.exe.exe windows x86
38174083713e590cf897cdb95c1ddaa8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
SetMailslotInfo
GetLogicalDriveStringsW
WritePrivateProfileSectionA
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
WaitNamedPipeW
EnumTimeFormatsW
SetProcessPriorityBoost
GetVolumePathNameW
GetPrivateProfileIntA
GetPrivateProfileStructW
GetSystemPowerStatus
GetCalendarInfoA
GetProcessHandleCount
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetFileAttributesA
GetFileAttributesW
GetModuleFileNameW
GetProcAddress
MoveFileW
SetComputerNameA
SearchPathA
ConvertThreadToFiber
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
DeleteTimerQueue
MoveFileA
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
GetDiskFreeSpaceA
OpenJobObjectW
FindFirstVolumeMountPointA
EnumDateFormatsA
GetModuleHandleA
FindNextFileW
GetStringTypeW
GetConsoleTitleW
EnumDateFormatsW
CompareStringA
GetShortPathNameW
SetCalendarInfoA
SetThreadAffinityMask
SetFileShortNameA
FindAtomW
GetVolumeNameForVolumeMountPointW
DeleteFileW
EnumSystemLocalesW
AreFileApisANSI
GetDriveTypeW
OpenWaitableTimerA
CreateMutexW
WideCharToMultiByte
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetLastError
HeapFree
DeleteFileA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
LoadLibraryW
WriteConsoleW
CreateFileW
CloseHandle
gdi32
GetCharABCWidthsW
SelectObject
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 298KB - Virtual size: 40.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ