Static task
static1
Behavioral task
behavioral1
Sample
f2e4a614d635bbe572ef735c39ae94610e50abdf40981266b57e28a022a5e6d4.exe
Resource
win10v2004-20230915-en
General
-
Target
f2e4a614d635bbe572ef735c39ae94610e50abdf40981266b57e28a022a5e6d4
-
Size
294KB
-
MD5
4d08851a8301f2d2dc8cbbe5a23aa730
-
SHA1
a4c11782587d365d857c6f0839806cae92bf67c7
-
SHA256
f2e4a614d635bbe572ef735c39ae94610e50abdf40981266b57e28a022a5e6d4
-
SHA512
59d66f17e444a2c6bce5d83407ad89a060c2cc6507e83f2ef3ce2b65f7487d7980f3469f237b9db6098d59a1f921425c2a564de7cef770c0aaa236780715dec0
-
SSDEEP
3072:1lt2rSIjpouhL660slTvNWtGWw+aSECJp9WzNxZIAuvaJxaYW/aT:QxouhL660slTvEt1wyzTIZIAumaY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f2e4a614d635bbe572ef735c39ae94610e50abdf40981266b57e28a022a5e6d4
Files
-
f2e4a614d635bbe572ef735c39ae94610e50abdf40981266b57e28a022a5e6d4.exe windows:5 windows x86
855a3b88e1ed28ef90ac3d20141e0b64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
GetTempFileNameW
WriteConsoleInputW
GetModuleHandleExA
GetLocaleInfoA
CommConfigDialogA
FindResourceExW
FindResourceW
DeleteVolumeMountPointA
OpenJobObjectA
ReadConsoleA
InterlockedDecrement
SetDefaultCommConfigW
QueryPerformanceCounter
GetEnvironmentStringsW
InterlockedCompareExchange
WriteConsoleInputA
OpenSemaphoreA
CreateHardLinkA
FreeEnvironmentStringsA
SetTapeParameters
SetThreadUILanguage
FindNextVolumeMountPointA
GetConsoleAliasesA
GetConsoleAliasesLengthA
ConvertFiberToThread
ReadConsoleW
GetCompressedFileSizeW
GetConsoleAliasExesW
WaitNamedPipeW
WriteFile
EnumTimeFormatsW
GetCommandLineA
GetDriveTypeA
GetVolumePathNameW
GetEnvironmentStrings
GetConsoleCP
GlobalAlloc
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
GetCalendarInfoW
GetCommandLineW
GetFileAttributesA
EnumSystemCodePagesA
SetSystemPowerState
IsDBCSLeadByte
GetStartupInfoW
CreateMailslotW
GetShortPathNameA
GetNamedPipeHandleStateW
InterlockedExchange
GetLastError
SetLastError
ReadConsoleOutputCharacterA
PeekConsoleInputW
SetVolumeLabelW
RemoveDirectoryA
CopyFileA
EnumSystemCodePagesW
FreeUserPhysicalPages
SetComputerNameA
FindClose
GetAtomNameA
SetCalendarInfoW
MoveFileA
SetConsoleCtrlHandler
AddAtomA
HeapWalk
SetCommMask
GetPrivateProfileSectionNamesA
GetOEMCP
FindNextFileA
_lread
GetModuleHandleA
GetStringTypeW
VirtualProtect
EnumDateFormatsW
PeekConsoleInputA
FindFirstVolumeA
GetWindowsDirectoryW
DeleteFileW
WriteConsoleW
FlushFileBuffers
SetStdHandle
SetConsoleCP
GetVolumeNameForVolumeMountPointA
SetFilePointer
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
DeleteFileA
WideCharToMultiByte
HeapReAlloc
HeapSetInformation
RaiseException
IsProcessorFeaturePresent
HeapCreate
GetStdHandle
GetModuleFileNameW
EncodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetACP
IsValidCodePage
SetHandleCount
GetFileType
CloseHandle
FreeEnvironmentStringsW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
RtlUnwind
LCMapStringW
MultiByteToWideChar
CreateFileW
user32
CharUpperA
CharUpperBuffA
gdi32
GetTextFaceA
winhttp
WinHttpWriteData
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 30.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tahif Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gih Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ