Static task
static1
Behavioral task
behavioral1
Sample
85cf1a858ae63c8fa82f4a930c339b32595abd3718780d148c488c37cc1daf5f.exe
Resource
win10v2004-20230915-en
General
-
Target
85cf1a858ae63c8fa82f4a930c339b32595abd3718780d148c488c37cc1daf5f
-
Size
737KB
-
MD5
cc5e3daad28186d52a3b0b8afce2f4dd
-
SHA1
1c4bd0b761f32d83491c1e9f48b94297bf867908
-
SHA256
85cf1a858ae63c8fa82f4a930c339b32595abd3718780d148c488c37cc1daf5f
-
SHA512
95bb7c673bc5c2b6870a4e78afbbf7a36fdabffd03a767a347a507f6578638c431922cb4192a1ce388709bfad0d863c3ad92d762f662a39475262556bf52e8ba
-
SSDEEP
12288:WRtqcIkStQIIdIuKtCTp+bwiLnx9H/csWbeP7+jGHczkpDctyOQ7lDpz4Ja4Gjjj:WWcI/QIIouGnx9fcneTjmkpDcMbxDpM6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85cf1a858ae63c8fa82f4a930c339b32595abd3718780d148c488c37cc1daf5f
Files
-
85cf1a858ae63c8fa82f4a930c339b32595abd3718780d148c488c37cc1daf5f.exe windows:5 windows x86
de327b03321c28ef8e77881c2e5f61b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatW
FillConsoleOutputCharacterA
EnumResourceNamesW
SetVolumeLabelA
EndUpdateResourceW
GetConsoleAliasA
WritePrivateProfileSectionA
GetSystemWindowsDirectoryW
InterlockedCompareExchange
SetComputerNameW
AddConsoleAliasW
SetVolumeMountPointW
_lclose
MoveFileWithProgressA
GetTickCount
GetNumberFormatA
CreateActCtxW
TzSpecificLocalTimeToSystemTime
SetProcessPriorityBoost
GetVolumeInformationA
GlobalFindAtomA
LoadLibraryW
TerminateThread
ReadConsoleInputA
SizeofResource
GetFileAttributesA
TransactNamedPipe
FindNextVolumeW
CreateSemaphoreA
FileTimeToSystemTime
GetCompressedFileSizeA
GetACP
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
PeekConsoleInputW
RemoveDirectoryA
EnumSystemCodePagesW
_hwrite
InterlockedExchangeAdd
LocalAlloc
GetFileType
CreateHardLinkW
AddAtomW
BeginUpdateResourceA
GetCommMask
FoldStringW
FindNextFileA
FreeEnvironmentStringsW
VirtualProtect
TerminateJobObject
GetWindowsDirectoryW
GetCurrentProcessId
OpenFileMappingA
LocalFree
GetProcessHeap
SetEndOfFile
CreateFileA
CloseHandle
SetStdHandle
WriteConsoleW
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MultiByteToWideChar
GetModuleHandleW
ExitProcess
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
ReadFile
GetOEMCP
IsValidCodePage
SetHandleCount
GetStdHandle
GetStartupInfoA
SetFilePointer
GetModuleFileNameA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetModuleHandleA
WriteConsoleA
GetConsoleOutputCP
user32
GetWindowTextLengthW
LoadBitmapA
LoadMenuA
CharUpperBuffA
LoadMenuW
SetMenu
CharToOemBuffW
ChangeDisplaySettingsA
GetMessagePos
Sections
.text Size: 664KB - Virtual size: 664KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ