Static task
static1
Behavioral task
behavioral1
Sample
4ef970957cf511a70b56731dfb60f9088aa396d00da76fa766302cc762f74e6d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4ef970957cf511a70b56731dfb60f9088aa396d00da76fa766302cc762f74e6d.exe
Resource
win10v2004-20230831-en
General
-
Target
4ef970957cf511a70b56731dfb60f9088aa396d00da76fa766302cc762f74e6d
-
Size
810KB
-
MD5
fb42a72e20caa367809b47c8148b5b56
-
SHA1
2b8950ac51d392c3fd1af2a2de29b06b3476833c
-
SHA256
4ef970957cf511a70b56731dfb60f9088aa396d00da76fa766302cc762f74e6d
-
SHA512
7d1019407f8ad833d2e3ebe42dadd36c94c5efca905f7d4b1d3aa9d5439554f9f51ab1ecf8e47cf28d384abdcb5debd604c3b982735751bfb503acddff8651fe
-
SSDEEP
24576:gUpdTZZTvpxxt602p7Ci/eH+4+GePNtBl6tUzRLBUvVdczO:9pdDTRd6l+e4+GitBl2UzRLBUvVdD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ef970957cf511a70b56731dfb60f9088aa396d00da76fa766302cc762f74e6d
Files
-
4ef970957cf511a70b56731dfb60f9088aa396d00da76fa766302cc762f74e6d.exe windows x86
1a08a855b673c49f0929c8ef45dc36d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetLocalTime
DeleteCriticalSection
FlushFileBuffers
ReadFile
GetModuleFileNameW
SetEndOfFile
GetTempPathW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
GetFileSize
FindFirstFileExW
UnmapViewOfFile
MultiByteToWideChar
LoadLibraryW
GetProcAddress
WideCharToMultiByte
CreateFileMappingW
MapViewOfFile
CreateDirectoryW
GetCurrentProcess
GetShortPathNameW
GetLastError
GetTimeZoneInformation
CreateMutexW
ReleaseMutex
OpenFileMappingW
OpenProcess
OpenMutexW
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetCurrentThreadId
CreateFileW
FindClose
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
OutputDebugStringA
WriteFile
FindNextFileW
EnterCriticalSection
FindFirstFileW
IsValidCodePage
GetProcessHeap
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
HeapSize
GetTimeFormatW
GetDateFormatW
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
RtlUnwind
RaiseException
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetFileType
user32
IsWindowVisible
GetWindowPlacement
EnumDisplayMonitors
GetDesktopWindow
GetWindow
GetWindowRect
EnumChildWindows
GetMonitorInfoW
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHCreateDirectoryExW
shlwapi
PathRemoveFileSpecW
PathFileExistsW
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 496KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE