Static task
static1
Behavioral task
behavioral1
Sample
f16a69c2b0a1a1848ef39a2400fcb1992685f781fba47bf5b46f1c74b5c45850.exe
Resource
win7-20230831-en
General
-
Target
f16a69c2b0a1a1848ef39a2400fcb1992685f781fba47bf5b46f1c74b5c45850
-
Size
1014KB
-
MD5
faef8f2a69e20f58c9ad9deb6a196f29
-
SHA1
b194c9bb4b0a2502c4fbe912feafc4b894b827c7
-
SHA256
f16a69c2b0a1a1848ef39a2400fcb1992685f781fba47bf5b46f1c74b5c45850
-
SHA512
bcad236eecc6fc599c2e59ce944bc255fe732c613050b1503959a691928b0d93c458f1ba8eea5cff2b03eeaa8a1d5d2d126676581cb92194e2e8c3799797e1c5
-
SSDEEP
24576:SM8Bw6uTLLfFbPbX78910YkkjPzJZCBpd:FTHr871jPzJZ8p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f16a69c2b0a1a1848ef39a2400fcb1992685f781fba47bf5b46f1c74b5c45850
Files
-
f16a69c2b0a1a1848ef39a2400fcb1992685f781fba47bf5b46f1c74b5c45850.exe windows:5 windows x86
32e05cc798b949569e87e30d17127890
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
GetFullPathNameW
GetFileAttributesW
GetUserDefaultLCID
DeleteFileW
MoveFileExW
CopyFileW
MoveFileW
ReadFile
GetVolumeInformationW
CancelIo
TlsSetValue
SetLastError
EnterCriticalSection
FindNextFileW
WriteFile
GetDiskFreeSpaceW
SetFileTime
SetThreadPriority
LeaveCriticalSection
InitializeCriticalSection
FindClose
WaitForSingleObject
CreateFileW
GetCurrentThreadId
SuspendThread
ResumeThread
SetFileAttributesW
Sleep
GetFileInformationByHandle
FormatMessageW
LocalFileTimeToFileTime
GetLastError
FileTimeToSystemTime
GetCurrentThread
TerminateThread
TlsAlloc
CloseHandle
GetLocalTime
GetOverlappedResult
DeleteCriticalSection
SystemTimeToFileTime
TlsGetValue
SystemTimeToTzSpecificLocalTime
TlsFree
CreateEventA
GetTickCount
GetDriveTypeW
SetFilePointer
SetEndOfFile
FlushFileBuffers
GetFileSizeEx
GetFileSize
BackupRead
BackupSeek
GetFileTime
BackupWrite
CreateHardLinkW
SetFileValidData
FindFirstFileW
CreateMutexA
ReleaseMutex
GetSystemTimeAsFileTime
SetPriorityClass
GetCommandLineW
SetSystemPowerState
GetCurrentProcess
GetThreadLocale
CreatePipe
DuplicateHandle
OpenProcess
ProcessIdToSessionId
TzSpecificLocalTimeToSystemTime
GetCurrentProcessId
SetThreadExecutionState
GetSystemTime
GetLongPathNameW
GetFileAttributesExW
GetStdHandle
SetConsoleMode
GetConsoleMode
WriteConsoleW
GetTempPathW
CreateProcessW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
FreeLibrary
UnmapViewOfFile
OpenMutexA
CreateFileMappingA
MapViewOfFile
DeviceIoControl
RemoveDirectoryW
FindFirstChangeNotificationW
GetVolumeNameForVolumeMountPointW
FindCloseChangeNotification
FindNextChangeNotification
GetEnvironmentVariableW
InterlockedExchange
VirtualProtect
VirtualFree
InterlockedCompareExchange
VirtualAlloc
GetModuleFileNameW
SetEvent
GetVersionExA
GetModuleHandleW
GetEnvironmentStringsW
WriteConsoleA
OutputDebugStringA
AttachConsole
OutputDebugStringW
FreeConsole
GetFileType
AllocConsole
SetThreadLocale
FindFirstFileExW
GetSystemDirectoryW
GlobalAlloc
GlobalFree
LoadLibraryW
GlobalLock
MultiByteToWideChar
WideCharToMultiByte
CreateMutexW
RtlCaptureStackBackTrace
GetExitCodeThread
RaiseException
CreateThread
IsBadReadPtr
SetUnhandledExceptionFilter
ExitProcess
SizeofResource
FindResourceA
LockResource
LoadResource
GetSystemInfo
VirtualQuery
LoadLibraryExA
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
CreateEventW
GetStringTypeW
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
LoadLibraryExW
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetModuleFileNameA
GetACP
HeapAlloc
HeapReAlloc
HeapFree
IsValidLocale
EnumSystemLocalesW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
GetConsoleCP
HeapSize
SetFilePointerEx
Sections
.text Size: 628KB - Virtual size: 628KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 190KB - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE