Static task
static1
Behavioral task
behavioral1
Sample
d4cf4eae82f9dfee30bd30ac780647fbedcaf3369f386f2644277feef0adc95a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d4cf4eae82f9dfee30bd30ac780647fbedcaf3369f386f2644277feef0adc95a.exe
Resource
win10v2004-20230915-en
General
-
Target
d4cf4eae82f9dfee30bd30ac780647fbedcaf3369f386f2644277feef0adc95a
-
Size
3.3MB
-
MD5
00a46635675a29750a3115a3be2edb33
-
SHA1
9df7af845d8cc1590cb76ad2eb9e41a2619462f3
-
SHA256
d4cf4eae82f9dfee30bd30ac780647fbedcaf3369f386f2644277feef0adc95a
-
SHA512
e91293e34d6663a606495d5464d60bc37e214dcf0fd4a363c822dc9a6b7b982077e44d5b6e442f9bcb1ca462cf1f091cc6d9e06198863bb8a46cd3b0a2442b9a
-
SSDEEP
49152:z6JKAu/7vR0DWo4p7tlIhIg1QOYWXUkQnTKymdcybHt7XsKui8w:z6JKAAjR0KoWlIP5YWRQzybHWKuM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4cf4eae82f9dfee30bd30ac780647fbedcaf3369f386f2644277feef0adc95a
Files
-
d4cf4eae82f9dfee30bd30ac780647fbedcaf3369f386f2644277feef0adc95a.exe windows x86
a2d6a955c9504f6a8d1d2e369cc7acbe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
WaitForSingleObject
GetDiskFreeSpaceExW
lstrlenW
GetCommandLineW
CreateProcessW
CreateEventW
DuplicateHandle
OpenProcess
TerminateProcess
MoveFileExW
GetTickCount
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetEvent
WriteFile
lstrcmpiW
RaiseException
InterlockedIncrement
SetErrorMode
FlushInstructionCache
SetCurrentDirectoryW
GetSystemDirectoryW
WaitForMultipleObjects
ResetEvent
GetFileType
SystemTimeToFileTime
GetCurrentDirectoryW
DosDateTimeToFileTime
SetFileTime
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetVersionExW
GetTempPathW
GetStringTypeW
GetStringTypeA
LCMapStringA
SetStdHandle
WriteConsoleW
GetSystemWindowsDirectoryW
WriteConsoleA
GetLocaleInfoA
GetModuleHandleA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapCreate
LCMapStringW
GetStartupInfoA
SetHandleCount
IsValidCodePage
InterlockedCompareExchange
GetCPInfo
FlushFileBuffers
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
GetStdHandle
RtlUnwind
GetStartupInfoW
CreateThread
ExitThread
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsAlloc
ReleaseMutex
HeapWalk
HeapLock
OpenThread
HeapUnlock
TlsSetValue
OutputDebugStringW
SetLastError
DeleteFileW
CreateDirectoryW
GetCurrentThreadId
GetCurrentProcess
LoadLibraryExW
LoadLibraryW
FreeResource
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
GetACP
FormatMessageW
WideCharToMultiByte
GetLastError
CreateMutexW
GetModuleFileNameW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleW
DeviceIoControl
GetCurrentProcessId
CreateFileW
SetFilePointer
ReadFile
CloseHandle
GetProcAddress
TlsGetValue
GetFileSizeEx
SetFilePointerEx
SetEndOfFile
LocalFileTimeToFileTime
GetSystemTimeAsFileTime
CreateFileA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetOEMCP
Sleep
FreeLibrary
GetConsoleOutputCP
user32
ShowWindow
IsIconic
FindWindowW
MessageBoxW
UnregisterClassA
GetActiveWindow
CreateWindowExW
LoadCursorW
GetClassInfoExW
RegisterClassExW
CharNextW
CallWindowProcW
DestroyWindow
DefWindowProcW
TranslateMessage
GetMessageW
PeekMessageW
RegisterWindowMessageW
PostThreadMessageW
PostQuitMessage
PostMessageW
DisableProcessWindowsGhosting
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowLongW
SetWindowPos
SetWindowTextW
SendMessageW
GetSystemMetrics
LoadImageW
GetParent
IsWindowVisible
GetWindow
GetWindowLongW
GetWindowRect
LoadStringW
DispatchMessageW
advapi32
AllocateAndInitializeSid
SaferCreateLevel
QueryServiceStatusEx
OpenServiceW
ControlService
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
CreateServiceW
OpenSCManagerW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
SaferCloseLevel
CreateProcessAsUserW
FreeSid
GetLengthSid
SetTokenInformation
SaferComputeTokenFromLevel
RegQueryValueExA
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoInitialize
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
DispCallFunc
VarUI4FromStr
shlwapi
SHGetValueW
PathCombineW
PathFileExistsW
StrCmpNIW
StrCmpIW
PathRemoveBackslashW
PathIsRootW
PathAppendW
StrStrIW
PathRemoveFileSpecW
comctl32
InitCommonControlsEx
psapi
GetModuleFileNameExW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11.5MB - Virtual size: 11.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ