Static task
static1
Behavioral task
behavioral1
Sample
d7f2cafe0625965ddaaa95c39a3c6b9608ba283fea2461bd326b7e9ec5a23d26.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
d7f2cafe0625965ddaaa95c39a3c6b9608ba283fea2461bd326b7e9ec5a23d26.exe
Resource
win10v2004-20230621-en
General
-
Target
d7f2cafe0625965ddaaa95c39a3c6b9608ba283fea2461bd326b7e9ec5a23d26
-
Size
1.6MB
-
MD5
2b46275a4464fc0afba0d4ce431499a0
-
SHA1
ba152fdf207f14a1b784c01be9bacba0a42dc6f2
-
SHA256
d7f2cafe0625965ddaaa95c39a3c6b9608ba283fea2461bd326b7e9ec5a23d26
-
SHA512
61e1eec49833fc009cf87d7757822c218e469df85d77f6cf8de9d6bba9e00af6e744c2ff99a6cdc3358509cd515f7df9466a549a9ec7522c55da3158ac50fdb1
-
SSDEEP
49152:pcOe0YOO+vmwacsrVM0Q9OTP+q7MRKm1Cgz8zEsvS7Jo1S6:WyY0mpcH99H1CgO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7f2cafe0625965ddaaa95c39a3c6b9608ba283fea2461bd326b7e9ec5a23d26
Files
-
d7f2cafe0625965ddaaa95c39a3c6b9608ba283fea2461bd326b7e9ec5a23d26.exe windows x86
bb72cdff8bfa7a68bef2d9de0eebeafc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
GetEnvironmentVariableW
GetLogicalDriveStringsW
VirtualQuery
GetPrivateProfileStringW
DeleteFileW
GetTickCount
MoveFileW
WriteFile
CreateFileW
GetModuleHandleExW
ReleaseMutex
GetVersionExW
SetFileAttributesW
lstrlenW
ReadFile
SetFilePointer
SetEndOfFile
GetFileSize
GetACP
GlobalMemoryStatusEx
SetEvent
InterlockedExchange
SetLastError
InterlockedExchangeAdd
ExpandEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetFileAttributesW
VirtualFree
VirtualProtect
QueryDosDeviceW
GetExitCodeProcess
GetModuleHandleW
CreateProcessW
GetProcessHeap
LocalFree
HeapAlloc
OpenProcess
WaitForSingleObject
WaitForMultipleObjects
HeapFree
MoveFileExW
SetErrorMode
GetCurrentProcess
OpenMutexW
GetCurrentProcessId
CloseHandle
Sleep
GetModuleFileNameW
VirtualAlloc
GetModuleHandleA
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
GetDriveTypeW
SearchPathW
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
GetVolumeInformationW
GetDiskFreeSpaceW
MultiByteToWideChar
WideCharToMultiByte
TerminateProcess
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
LoadLibraryExW
GetCurrentThreadId
GetComputerNameExW
SetFileTime
GetFileTime
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateMutexW
CreateEventW
ResetEvent
FindNextFileW
FindClose
FileTimeToSystemTime
ResumeThread
RaiseException
CreateDirectoryW
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
GetCurrentDirectoryW
GetWindowsDirectoryW
CopyFileW
GetTempFileNameW
GetFileSizeEx
FormatMessageW
DeviceIoControl
EncodePointer
GetCPInfo
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetLocalTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
OutputDebugStringW
GetStdHandle
GetFileType
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
CreateThread
ExitThread
FreeLibraryAndExitThread
ExitProcess
GetCurrentThread
HeapReAlloc
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
FlushFileBuffers
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
WaitForSingleObjectEx
SetStdHandle
HeapSize
WriteConsoleW
InterlockedDecrement
InterlockedIncrement
PeekNamedPipe
GetExitCodeThread
GetOverlappedResult
WaitNamedPipeW
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
ReleaseSemaphore
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
DeleteCriticalSection
DecodePointer
OpenFileMappingW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
DuplicateHandle
CreateTimerQueue
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
user32
wsprintfW
advapi32
RegCloseKey
RegCreateKeyExW
RegSetValueExW
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 271KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ