Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
255KB
-
MD5
d0ba34de65ce932f49439e2567de40ac
-
SHA1
0fcf53c7de29661208c5bece064a6dfbb37d92e8
-
SHA256
7f00025d8192a139535964c7cefbfeea180f03220d83f2fda1c338be7041773c
-
SHA512
c72019e3165e00ed76cc8e557b36f05a3ca0187735ded1796e0917e4d9e7875808e3208ce38653adadd70e763210db8c66937e6aacb680feb21ddc117788bbaa
-
SSDEEP
3072:eIAMheiuUUUuVJBmQxVLRrzYOF+1x80pS:PAMh/kT1VL1Tk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource file.exe
Files
-
file.exe.exe windows:5 windows x86
11881d8819d73ef84185d4a58d4e0742
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameW
SetVolumeLabelA
SetDefaultCommConfigA
FindResourceA
GetConsoleAliasesLengthW
GetModuleHandleExA
GetLocaleInfoA
GetConsoleAliasExesA
CommConfigDialogA
FindResourceExW
MapUserPhysicalPages
OpenJobObjectA
InterlockedDecrement
QueryPerformanceCounter
GetEnvironmentStringsW
InterlockedCompareExchange
WriteConsoleInputA
SetComputerNameW
FreeEnvironmentStringsA
SetTapeParameters
SetThreadUILanguage
ConvertFiberToThread
GetConsoleTitleA
ReadConsoleW
GetCompressedFileSizeW
WaitNamedPipeW
EnumTimeFormatsA
WriteFile
GetCommandLineA
GetDriveTypeA
GetVolumePathNameW
GetEnvironmentStrings
GetConsoleCP
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
DeleteVolumeMountPointW
EnumSystemCodePagesA
GetComputerNameA
SetSystemPowerState
GetAtomNameW
CreateFileW
FindNextVolumeMountPointW
GetStartupInfoW
GetNamedPipeHandleStateW
GetConsoleAliasesW
FindFirstFileA
GetLastError
SetLastError
HeapUnlock
CopyFileA
FindClose
LoadLibraryA
LocalAlloc
MoveFileA
BuildCommDCBAndTimeoutsW
CreateHardLinkW
RemoveDirectoryW
GetCommMask
AddAtomA
GetPrivateProfileSectionNamesA
GetOEMCP
FindNextFileA
GetModuleHandleA
GetStringTypeW
VirtualProtect
QueryPerformanceFrequency
FatalAppExitA
PeekConsoleInputA
GetShortPathNameW
SetCalendarInfoA
OpenSemaphoreW
GetWindowsDirectoryW
FindFirstVolumeW
DeleteFileW
ReadConsoleOutputCharacterW
IsProcessorFeaturePresent
WriteConsoleW
FlushFileBuffers
GetFileAttributesW
GetVolumeNameForVolumeMountPointA
SetStdHandle
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WideCharToMultiByte
HeapReAlloc
GetCommandLineW
HeapSetInformation
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetACP
IsValidCodePage
CloseHandle
FreeEnvironmentStringsW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
RaiseException
user32
CharUpperA
CharUpperBuffA
gdi32
GetTextFaceA
winhttp
WinHttpWriteData
Sections
.text Size: 209KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 30.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kugoda Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kofumi Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ