Static task
static1
Behavioral task
behavioral1
Sample
fe82c033128fd57013a32cb5b688696e4aa4ff22f83c5ddc03eee157018c1f58.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
fe82c033128fd57013a32cb5b688696e4aa4ff22f83c5ddc03eee157018c1f58.exe
Resource
win10v2004-20230703-en
General
-
Target
fe82c033128fd57013a32cb5b688696e4aa4ff22f83c5ddc03eee157018c1f58
-
Size
2.2MB
-
MD5
4494cd1d2caae8fe01fbcdb661daebd6
-
SHA1
8f6a0271b3a4c559b152ff2ef46d900639867e38
-
SHA256
16850f5b3cffea7cc6e8145ec1b7e2f1b72229b56d2e8da2a632edfbeb304733
-
SHA512
e0f79086298c617d14cc5fb650b7af784d463c5bbf30da36be5aff762cbd963d17773e3dbd56bfe479c9a5c27c5a49692e8dc33441d5d29a8b2380dafe544ec1
-
SSDEEP
12288:8NUDbEANPqrEdrER3wMnqfxDvTHY7jEe7l8gFb8:8NUDYANCodoViDvT4PEeJ8gJ8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe82c033128fd57013a32cb5b688696e4aa4ff22f83c5ddc03eee157018c1f58
Files
-
fe82c033128fd57013a32cb5b688696e4aa4ff22f83c5ddc03eee157018c1f58.exe windows x64
a431d26f718c0c144c3a6a9cdbb19216
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
ReadFile
GetModuleFileNameA
SizeofResource
GetFileSizeEx
GetCurrentProcess
WriteFile
DeviceIoControl
GetModuleFileNameW
GetTempPathW
CreateMutexA
WaitForSingleObject
CreateFileW
GetFileAttributesW
CreateToolhelp32Snapshot
GetLastError
GetFileAttributesA
Process32NextW
SetFileInformationByHandle
QueryFullProcessImageNameA
CreateFileA
LockResource
DeleteFileA
DeleteFileW
Process32FirstW
CloseHandle
RaiseException
GetSystemInfo
CreateThread
LoadResource
FindResourceW
MoveFileExW
GetFileSize
ExitProcess
GlobalMemoryStatusEx
QueryFullProcessImageNameW
GetTempFileNameW
lstrcmpiW
GetComputerNameA
SetUnhandledExceptionFilter
MultiByteToWideChar
GetModuleHandleExW
FreeLibrary
TerminateProcess
Sleep
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetProcAddress
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
shell32
ShellExecuteW
shlwapi
PathRemoveFileSpecW
PathIsPrefixW
PathFileExistsW
AssocQueryStringW
PathFindExtensionW
PathRemoveBackslashW
PathRemoveFileSpecA
PathFindFileNameW
wininet
InternetOpenW
InternetCloseHandle
InternetSetOptionW
InternetReadFile
InternetOpenUrlW
msvcrt
__wgetmainargs
_msize
_XcptFilter
__set_app_type
_wcmdln
?_set_new_mode@@YAHH@Z
_commode
?terminate@@YAXXZ
___lc_codepage_func
wctomb_s
ceil
log10
realloc
_clearfp
_time64
rand
srand
clock
calloc
memcpy
memmove
_amsg_exit
_CxxThrowException
memset
__C_specific_handler
strrchr
wcsrchr
_mbtowc_l
strtol
wcstol
strnlen
___mb_cur_max_func
wcsnlen
tolower
__pctype_func
strcpy_s
_errno
malloc
free
_initterm_e
_set_fmode
_initterm
_callnewh
__CxxFrameHandler3
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ