Static task
static1
Behavioral task
behavioral1
Sample
f68d40898659c503f82a109ccf7424cfcc821dbf0a48a4098517cf2d6f31c48e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f68d40898659c503f82a109ccf7424cfcc821dbf0a48a4098517cf2d6f31c48e.exe
Resource
win10v2004-20230915-en
General
-
Target
f68d40898659c503f82a109ccf7424cfcc821dbf0a48a4098517cf2d6f31c48e
-
Size
5.8MB
-
MD5
49287f514a3cf686d1f671d62511d52e
-
SHA1
177a035e6b6b245c22fcbadb3c06f2899cec5c38
-
SHA256
f68d40898659c503f82a109ccf7424cfcc821dbf0a48a4098517cf2d6f31c48e
-
SHA512
a25b73ac503b4a4cfddb69f020471e38bbb2e27a3c45d64ebce236aaf135c12e1fb6a649f8c400a2e8cd887a9866952a9e275f545d4959257f773bc657effa81
-
SSDEEP
98304:SvT9Td8STfLuV0GGSlVSa1QGPrVUxr6LIdk2:+5TdjbLu9Sb4rVYr6Lx2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f68d40898659c503f82a109ccf7424cfcc821dbf0a48a4098517cf2d6f31c48e
Files
-
f68d40898659c503f82a109ccf7424cfcc821dbf0a48a4098517cf2d6f31c48e.exe windows x86
90bd3b4907e757deca7dbd9e11904814
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
DecodePointer
CloseHandle
RaiseException
GetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
CreateMutexW
OpenEventW
Sleep
GetCurrentProcessId
GetSystemDirectoryW
GetSystemWow64DirectoryW
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadLibraryW
GetPrivateProfileIntW
CopyFileW
CreateFileW
DeleteFileW
GetFileAttributesExW
GetFileSize
SetFilePointer
WriteFile
OutputDebugStringW
ReleaseMutex
WaitForSingleObject
GetCurrentThreadId
lstrlenA
MultiByteToWideChar
LocalFree
VerSetConditionMask
ExpandEnvironmentStringsW
CreateDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
RemoveDirectoryW
GetPrivateProfileStringW
MoveFileExW
VerifyVersionInfoW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
LoadLibraryExW
LoadResource
SizeofResource
FindResourceW
lstrcmpiW
FindResourceExW
LockResource
GetDiskFreeSpaceExW
ReadFile
OpenMutexW
CreateEventW
GetCurrentProcess
TerminateProcess
CreateThread
TerminateThread
OpenProcess
GetLocalTime
GetTickCount
IsWow64Process
WritePrivateProfileStringW
GetSystemDefaultLangID
GetCommandLineW
GetEnvironmentVariableW
LoadLibraryA
GetComputerNameW
GetUserDefaultLCID
SetUnhandledExceptionFilter
CreateProcessW
GetProcessId
GetLongPathNameW
GetExitCodeProcess
ProcessIdToSessionId
GetVersionExW
ReadProcessMemory
GetModuleHandleA
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetLastError
GetWindowsDirectoryW
WinExec
MulDiv
lstrlenW
ResetEvent
WaitForMultipleObjects
GlobalFree
WaitNamedPipeW
GetOverlappedResult
CancelIo
GetExitCodeThread
ResumeThread
MoveFileW
SetFileAttributesW
GetCurrentThread
GetDateFormatW
GetTimeFormatW
FlushInstructionCache
VirtualProtect
VirtualQuery
GetCompressedFileSizeW
SetNamedPipeHandleState
InitializeCriticalSection
QueryPerformanceCounter
CreateFileA
DeviceIoControl
GetSystemTime
QueryPerformanceFrequency
FormatMessageW
GetStringTypeW
WaitForSingleObjectEx
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
InterlockedPopEntrySList
InterlockedPushEntrySList
VirtualAlloc
VirtualFree
LoadLibraryExA
GetThreadTimes
FreeLibraryAndExitThread
RtlUnwind
FindFirstFileExW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SetConsoleCtrlHandler
GetSystemInfo
ExitProcess
GetModuleHandleExW
ExitThread
GetStdHandle
GetFileType
IsValidLocale
EnumSystemLocalesW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
FlushFileBuffers
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
SetEndOfFile
WriteConsoleW
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
SetConsoleMode
ReadConsoleA
GetSystemDirectoryA
MoveFileExA
CompareFileTime
GetEnvironmentVariableA
PeekNamedPipe
SleepEx
LocalFileTimeToFileTime
SetFileTime
SystemTimeToFileTime
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetFileInformationByHandle
CreatePipe
CreateProcessA
GetStartupInfoA
GetPrivateProfileSectionW
GetUserDefaultUILanguage
GetDriveTypeW
GetFullPathNameW
Sections
.text Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 803KB - Virtual size: 803KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ