Static task
static1
Behavioral task
behavioral1
Sample
df8d23d4f2c5ee7fd82cef4f11ecff976f5f716df4c9e0388820ca42886d138e.exe
Resource
win10v2004-20230703-en
General
-
Target
df8d23d4f2c5ee7fd82cef4f11ecff976f5f716df4c9e0388820ca42886d138e
-
Size
817KB
-
MD5
18a7fd0613217b45146d596e18e89fd4
-
SHA1
a9f658705e78d6cff35c25961431ff588dcf6f34
-
SHA256
df8d23d4f2c5ee7fd82cef4f11ecff976f5f716df4c9e0388820ca42886d138e
-
SHA512
1f95cc9f8d38e6603e82c0baf8f1cc19d49ace80fb69fbaf4bdb7e257440fcc3dbce842552990bb7f4af8be53123225a7ba8607256c5c800a852a9c686ecc6be
-
SSDEEP
24576:D54Q/mQWEB+1qZAgmO++nJ/T+exrEKG99:D54Q/iEDAtOVJ/DxrEL9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df8d23d4f2c5ee7fd82cef4f11ecff976f5f716df4c9e0388820ca42886d138e
Files
-
df8d23d4f2c5ee7fd82cef4f11ecff976f5f716df4c9e0388820ca42886d138e.exe windows x86
04e6f3b72e548c719c7cd8b3a1be4f09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BuildCommDCBAndTimeoutsA
EndUpdateResourceW
OpenJobObjectA
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetHandleInformation
GetProfileStringW
GetTimeFormatA
OpenSemaphoreA
GetSystemDefaultLCID
FreeEnvironmentStringsA
GetTickCount
GenerateConsoleCtrlEvent
GetWindowsDirectoryA
WaitNamedPipeW
EnumTimeFormatsA
GetCommandLineA
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
DeleteVolumeMountPointW
GetExitCodeProcess
GetConsoleAliasW
SetConsoleCursorPosition
GetFileAttributesW
lstrcatA
GetStartupInfoW
CreateJobObjectA
EnumSystemLocalesA
GetConsoleAliasExesLengthA
FindFirstFileA
OpenMutexW
GetCurrentDirectoryW
SetLastError
GetProcAddress
MoveFileW
OpenWaitableTimerA
LoadLibraryA
InterlockedExchangeAdd
GetFileType
MoveFileA
GetNumberFormatW
GlobalGetAtomNameW
GetPrivateProfileSectionNamesA
GetModuleHandleA
FreeEnvironmentStringsW
FindNextFileW
CreateMailslotA
EnumDateFormatsW
PeekConsoleInputA
SetCalendarInfoA
OpenSemaphoreW
SetFileShortNameA
ReadConsoleInputW
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
DebugBreak
ResetWriteWatch
ReadConsoleOutputCharacterW
DeleteFileA
GetSystemDefaultLangID
MoveFileExA
GetConsoleAliasExesA
SetFilePointer
GetStartupInfoA
WideCharToMultiByte
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
GetCommandLineW
HeapSetInformation
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
IsProcessorFeaturePresent
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
HeapReAlloc
GetConsoleCP
SetStdHandle
WriteConsoleW
FlushFileBuffers
ReadFile
CreateFileW
CloseHandle
gdi32
GetCharABCWidthsW
GetCharWidthW
GetTextFaceA
SelectPalette
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 598KB - Virtual size: 31.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wubu Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ