Static task
static1
Behavioral task
behavioral1
Sample
cfcb4fce89f1488598d0af3b7f9caa0f3af8feb7eb07591df828edf1c38fd7b5.exe
Resource
win7-20230831-en
General
-
Target
cfcb4fce89f1488598d0af3b7f9caa0f3af8feb7eb07591df828edf1c38fd7b5
-
Size
2.5MB
-
MD5
4df9d96784cb9b62fab7096bc7b4a0c9
-
SHA1
06525e8ce3bbf40463e3c9aa0f0c93b5c3226633
-
SHA256
cfcb4fce89f1488598d0af3b7f9caa0f3af8feb7eb07591df828edf1c38fd7b5
-
SHA512
330e118d8338afb66c9f723e5662b531b596ac6778d0d642455e7f45d84db401aa91eb2ed5f53990182e50e747ee84e462efa86e84a95c94600f470b6f369f8a
-
SSDEEP
49152:DrffXPhog5BnalZzn1Nz21URKag6Dk3H640RqDtHj3rtgiomvJi:PXPhogralZzn1NKiYL6DiH640RqDtDx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cfcb4fce89f1488598d0af3b7f9caa0f3af8feb7eb07591df828edf1c38fd7b5
Files
-
cfcb4fce89f1488598d0af3b7f9caa0f3af8feb7eb07591df828edf1c38fd7b5.exe windows:5 windows x86
87c93de68afbc581cf7c4df9fa517fd5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringW
GetModuleHandleW
lstrcmpW
lstrcpyA
lstrcatA
lstrlenA
WideCharToMultiByte
FindClose
FindFirstFileW
FindNextFileW
GetSystemDirectoryW
LoadResource
LockResource
SizeofResource
FindResourceW
lstrcatW
lstrlenW
MultiByteToWideChar
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetModuleFileNameW
DecodePointer
RaiseException
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
GetStringTypeW
GetSystemInfo
VirtualProtect
VirtualQuery
FreeLibrary
GetProcAddress
LoadLibraryExA
InitializeCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
LocalAlloc
LocalReAlloc
LocalFree
OutputDebugStringA
EncodePointer
SetLastError
GetCurrentThreadId
GetModuleHandleA
LoadLibraryExW
LoadLibraryA
LoadLibraryW
GlobalDeleteAtom
GlobalAddAtomW
GlobalFindAtomW
CompareStringW
GetThreadLocale
MulDiv
GlobalSize
FormatMessageW
CopyFileW
CloseHandle
WaitForSingleObject
SetThreadPriority
ResumeThread
GetCurrentThread
GetVersionExW
lstrcmpA
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetCurrentProcessId
FileTimeToLocalFileTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GlobalFlags
GlobalGetAtomNameW
GetLocaleInfoW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetFileAttributesW
GetFileTime
GetFullPathNameW
GetTempFileNameW
CreateFileW
DeleteFileW
FlushFileBuffers
GetFileSize
GetVolumeInformationW
LockFile
ReadFile
SetEndOfFile
SetFilePointer
UnlockFile
WriteFile
DuplicateHandle
GetCurrentProcess
lstrcmpiW
GetTickCount
GetCurrentDirectoryW
lstrcpyW
FindResourceExW
GetFileAttributesExW
GetFileSizeEx
SetErrorMode
GetWindowsDirectoryW
VerSetConditionMask
VerifyVersionInfoW
GetTempPathW
GetProfileIntW
SearchPathW
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
GetCommandLineA
GetCommandLineW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
VirtualAlloc
HeapQueryInformation
QueryPerformanceFrequency
SetStdHandle
GetFileType
GetStdHandle
ExitProcess
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
oledlg
OleUIBusyW
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 323KB - Virtual size: 322KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 704KB - Virtual size: 708KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE