Static task
static1
Behavioral task
behavioral1
Sample
c058f9f2088b59edad2e85f802e83c2f0f32c35eb44b32d3a4b968cd7a81b428.exe
Resource
win10v2004-20230220-en
General
-
Target
c058f9f2088b59edad2e85f802e83c2f0f32c35eb44b32d3a4b968cd7a81b428
-
Size
359KB
-
MD5
bd44896de835170ed12f601c53c23be2
-
SHA1
5769c3c9d9fa70190b40831d3d7ae97b376ea3ee
-
SHA256
c058f9f2088b59edad2e85f802e83c2f0f32c35eb44b32d3a4b968cd7a81b428
-
SHA512
889aed8310ce16bc60cc3465e004c70b37b1318d91a1a24bbbfb453660f707ec082ee0756adf3917ba863b27590fd679c303793af52dd2faf891474d5fe260a5
-
SSDEEP
3072:y/VL8NrjV4HyCc+s5u2o8saxOs7PE2rUBgaXB5VfQpr20/T:gL8djaCvxowfpAXB4D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c058f9f2088b59edad2e85f802e83c2f0f32c35eb44b32d3a4b968cd7a81b428
Files
-
c058f9f2088b59edad2e85f802e83c2f0f32c35eb44b32d3a4b968cd7a81b428.exe windows x86
ff663290422cfc5dabe317e4ebb150ed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleOutputW
ReadConsoleA
InterlockedDecrement
AddConsoleAliasW
GetTickCount
GetConsoleAliasesA
SetProcessPriorityBoost
LoadLibraryW
GetCalendarInfoA
FormatMessageW
FindNextVolumeW
WriteConsoleW
ReadFile
GetModuleFileNameW
CreateActCtxA
GetACP
GetLogicalDriveStringsA
GetLastError
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
FindResourceExW
IsValidCodePage
LoadLibraryA
CreateHardLinkW
SetCurrentDirectoryW
GlobalHandle
WaitForMultipleObjects
GetModuleHandleA
QueryMemoryResourceNotification
GetConsoleTitleW
VirtualProtect
GetCurrentDirectoryA
OpenEventW
GetVersionExA
FindAtomW
FileTimeToLocalFileTime
GetCurrentProcessId
AddConsoleAliasA
OpenFileMappingA
CreateThread
GetConsoleOutputCP
WriteConsoleA
GetConsoleAliasExesA
CommConfigDialogA
GetLocaleInfoA
CreateTimerQueue
LocalLock
GetComputerNameA
GetProcessHeap
SetEndOfFile
SetFilePointer
SetStdHandle
FlushFileBuffers
GetConsoleMode
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
MultiByteToWideChar
GetModuleHandleW
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
HeapSize
GetCPInfo
GetOEMCP
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
CloseHandle
CreateFileA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
user32
LoadMenuW
CharUpperBuffA
GetCaretPos
gdi32
GetTextExtentExPointA
advapi32
ReportEventA
MapGenericMask
ReadEventLogW
ole32
CoGetPSClsid
winhttp
WinHttpCheckPlatform
WinHttpOpen
WinHttpSetDefaultProxyConfiguration
msimg32
TransparentBlt
Sections
.text Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 48.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ