Static task
static1
Behavioral task
behavioral1
Sample
f2bb4e90fd8a61c6e8d8195b09acabcdd4c0791c3a152f4f1b7753fb6a93d51c.exe
Resource
win10-20230703-en
General
-
Target
f2bb4e90fd8a61c6e8d8195b09acabcdd4c0791c3a152f4f1b7753fb6a93d51c
-
Size
411KB
-
MD5
fddd27d4a68bbf8a7e6f403322451160
-
SHA1
d9cee98522e86a6b217ff98f0572eea8ea1ce29e
-
SHA256
f2bb4e90fd8a61c6e8d8195b09acabcdd4c0791c3a152f4f1b7753fb6a93d51c
-
SHA512
d664bb94867130b3f3782a0564b3cee70975cdad6911bee46a4dec1dccdefe479784b88c4776998add60d3fdffb524edf6cea5655d46bf655b0959f6b202340e
-
SSDEEP
6144:IFI31h9CLVGhUc5JFWy7pCl62RGzyENGjGHPcw:IiTCLIFWaAl6nyLiv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f2bb4e90fd8a61c6e8d8195b09acabcdd4c0791c3a152f4f1b7753fb6a93d51c
Files
-
f2bb4e90fd8a61c6e8d8195b09acabcdd4c0791c3a152f4f1b7753fb6a93d51c.exe windows x86
53827632ddd0de733b0a70caaced2fc3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
SetInformationJobObject
GetConsoleAliasesLengthW
GetConsoleAliasExesA
ConvertThreadToFiber
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
MoveFileExW
InterlockedDecrement
WaitNamedPipeA
GetCurrentProcess
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
SetHandleInformation
GetProfileStringW
GetComputerNameW
GetTimeFormatA
FlushConsoleInputBuffer
GetSystemDefaultLCID
FreeEnvironmentStringsA
_lclose
_lcreat
GetModuleHandleW
GetNumberFormatA
ReadConsoleOutputA
EnumTimeFormatsW
GetUserDefaultLangID
GetCommandLineA
GetDriveTypeA
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
TerminateThread
ReadConsoleInputA
_hread
GetCalendarInfoW
GetConsoleAliasW
IsDBCSLeadByte
GetStartupInfoW
CreateMailslotW
SetCurrentDirectoryA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
HeapSize
BackupWrite
MoveFileW
SetComputerNameA
OpenMutexA
InterlockedExchangeAdd
OpenWaitableTimerW
GetFileType
MoveFileA
BuildCommDCBAndTimeoutsW
SetConsoleCtrlHandler
GlobalGetAtomNameW
GetPrivateProfileStructA
FindNextFileA
CreateIoCompletionPort
GetModuleHandleA
OpenFileMappingW
GetProcessAffinityMask
FindNextFileW
VirtualProtect
EnumDateFormatsW
GetConsoleCursorInfo
FatalAppExitA
PeekConsoleInputA
OpenSemaphoreW
FindFirstVolumeA
LocalSize
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
DeleteFileW
ReadConsoleOutputCharacterW
EnumSystemLocalesW
CloseHandle
ReadFile
WriteConsoleW
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
DeleteFileA
ExitProcess
HeapSetInformation
RtlUnwind
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
SetFilePointer
SetHandleCount
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
RaiseException
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
IsProcessorFeaturePresent
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapReAlloc
LCMapStringW
CreateFileW
user32
CharUpperBuffA
CharUpperA
Sections
.text Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 167KB - Virtual size: 30.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ