Static task
static1
Behavioral task
behavioral1
Sample
diskusage.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
diskusage.exe
Resource
win10v2004-20230220-en
General
-
Target
diskusage.exe
-
Size
45KB
-
MD5
9fdd55728dc2f0be729b4a552e0681f8
-
SHA1
c540264769f0ccf256e1edb74ac01f6b0ce3b03c
-
SHA256
d77f6cdf3d0a320e8e4335a96fef4804c2f8b164ed8640f8260238e567c0c050
-
SHA512
1d03a36cd476dcfdc8f84423e6b77ec26af79c82210da3c21baf7d464ec2a7cf23abbfa97df85c78f8e047380b30e597088200cf5b16826bfdb540df0a727bd5
-
SSDEEP
768:s0MWSu1dylj6G+Sz18JvcZLD3D3tPa5oTXOiHmGFE:sdWSu1zG+S0v67DNa5ViGGF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource diskusage.exe
Files
-
diskusage.exe.exe windows x86
997a472f95c94f01debd1236b75562e8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler4_common
_controlfp
_wcsicmp
?terminate@@YAXXZ
_initterm
__setusermatherr
__p__fmode
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
wprintf
malloc
_wcsnicmp
free
wcschr
memcpy
memcmp
_wcstoui64
atoi
_errno
wcstoul
wcscpy_s
iswspace
_vsnwprintf
memmove
memset
kernel32
CreateFileW
GetDateFormatW
SystemTimeToTzSpecificLocalTime
GetTimeFormatW
GetNumberFormatW
FileTimeToSystemTime
GetLocaleInfoA
GetLocaleInfoW
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
GetFileInformationByHandle
DeviceIoControl
FindNextFileW
FindFirstFileExW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetTickCount
FindFirstFileW
GetFullPathNameW
GetStdHandle
GetPrivateProfileIntW
FindClose
GetPrivateProfileStringW
GetConsoleMode
GetLastError
CloseHandle
GetCurrentDirectoryW
SetLastError
GetConsoleOutputCP
WriteFile
SetConsoleMode
FormatMessageW
WriteConsoleW
LocalFree
GetModuleHandleW
WideCharToMultiByte
GetFileType
Sleep
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
LookupPrivilegeValueW
OpenProcessToken
ntdll
RtlInsertElementGenericTableAvl
RtlDeleteCriticalSection
RtlIsDosDeviceName_U
RtlDosPathNameToRelativeNtPathName_U
RtlReleaseRelativeName
RtlCopyUnicodeString
RtlLookupElementGenericTableAvl
NtClose
RtlEnterCriticalSection
RtlInitializeCriticalSection
RtlFreeHeap
RtlLeaveCriticalSection
NtCreateFile
NtQueryDirectoryFileEx
RtlIsNameInExpression
NtQueryInformationFile
RtlUpcaseUnicodeString
RtlAppendUnicodeToString
RtlAppendUnicodeStringToString
NtOpenFile
RtlNtStatusToDosError
RtlDosPathNameToNtPathName_U
RtlInitUnicodeString
RtlFreeUnicodeString
RtlInitializeGenericTableAvl
api-ms-win-core-rtlsupport-l1-2-0
RtlCompareMemory
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ