Static task
static1
Behavioral task
behavioral1
Sample
afdf8d863bbfa3911cf4a78e29b47d009779511a8002a2140376a1e0e2433fa3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
afdf8d863bbfa3911cf4a78e29b47d009779511a8002a2140376a1e0e2433fa3.exe
Resource
win10v2004-20230915-en
General
-
Target
afdf8d863bbfa3911cf4a78e29b47d009779511a8002a2140376a1e0e2433fa3
-
Size
15.3MB
-
MD5
6b694e292ebbc4d70ff455d4c773d0ec
-
SHA1
df795ccb6a56c91122f2975d2dd5d884f53628b0
-
SHA256
afdf8d863bbfa3911cf4a78e29b47d009779511a8002a2140376a1e0e2433fa3
-
SHA512
02cc76c7378bc0d9ca903c22ab81cdd83fd0a3994551688235a0b609c0ed5cf8035ccb521d18639f6f5234d51bd3be260d4c24ca29f9e12af6dee069fffb4a80
-
SSDEEP
393216:WdTCOdBD+PcA1idDiUoDvs6koyis3S9kYdDlbWZ:W0OdQPZMduPsxS9kwRby
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afdf8d863bbfa3911cf4a78e29b47d009779511a8002a2140376a1e0e2433fa3
Files
-
afdf8d863bbfa3911cf4a78e29b47d009779511a8002a2140376a1e0e2433fa3.exe windows:4 windows x86
639d6f687fc7bc8151e727fc57c6365b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
SystemTimeToFileTime
GetCurrentDirectoryW
CreateDirectoryW
SetFileTime
WriteFile
LocalFileTimeToFileTime
WideCharToMultiByte
CloseHandle
ReadFile
CreateFileW
SetFilePointer
MultiByteToWideChar
CreateFileA
CreateProcessW
GetStartupInfoW
SetFileAttributesW
GetTempPathW
GetFileAttributesW
GetModuleFileNameW
GetLocaleInfoW
SetEndOfFile
WriteConsoleW
GetLastError
DeleteFileW
GetSystemTimeAsFileTime
InterlockedDecrement
HeapFree
HeapAlloc
GetVersionExA
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
DeleteCriticalSection
Sleep
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
ExitProcess
GetStdHandle
GetModuleFileNameA
RaiseException
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSection
SetStdHandle
FlushFileBuffers
LoadLibraryA
HeapSize
WriteConsoleA
GetConsoleOutputCP
user32
MessageBoxW
wsprintfW
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
psapi
EnumProcessModules
EnumProcesses
GetModuleFileNameExW
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ