Static task
static1
Behavioral task
behavioral1
Sample
f4d8e1611b03c32b3e961363747ebdc957eaa65c074735909d788d25735e9df8.exe
Resource
win10v2004-20230915-en
General
-
Target
f4d8e1611b03c32b3e961363747ebdc957eaa65c074735909d788d25735e9df8
-
Size
777KB
-
MD5
746526f7b51a06839c219645a4c6e08d
-
SHA1
f690318230f2add9ba06a9d8e69e22dd0a533a54
-
SHA256
f4d8e1611b03c32b3e961363747ebdc957eaa65c074735909d788d25735e9df8
-
SHA512
238c59e39df27872e0930fb4c9c1c02e3f29347d0fa8fc52595d128b592ed7cec4204968d15337f6899bc7ad53ba27c2b7cafa7f576281e7a1f14a096868f015
-
SSDEEP
12288:kOIIa/1JN0CFPTHZ7JZCUSrSCyR2yVCA8YHtwJFsU0JA7uhTGv8v4kuriNm4P:kFFrO6Tt3I42uCzbjP0H8/wNm4P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4d8e1611b03c32b3e961363747ebdc957eaa65c074735909d788d25735e9df8
Files
-
f4d8e1611b03c32b3e961363747ebdc957eaa65c074735909d788d25735e9df8.exe windows:5 windows x86
14856ebf22b780f496c6e663a3abe869
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
SetDefaultCommConfigA
GetLocaleInfoA
GetConsoleAliasExesA
GetDriveTypeW
CommConfigDialogA
GetCPInfo
lstrcpynA
FindResourceExW
FindResourceW
WaitNamedPipeA
QueryPerformanceCounter
GetEnvironmentStringsW
GetModuleHandleExW
WriteConsoleInputA
GetModuleHandleW
GenerateConsoleCtrlEvent
ConvertFiberToThread
GetWindowsDirectoryA
EnumTimeFormatsA
EnumTimeFormatsW
GetCommandLineA
GetEnvironmentStrings
GlobalAlloc
LoadLibraryW
ReadConsoleInputA
CopyFileW
SetConsoleCP
EnumSystemCodePagesA
GetConsoleAliasW
GetFileAttributesW
SetSystemPowerState
ReplaceFileW
ReadFile
GetCompressedFileSizeA
FindNextVolumeMountPointW
GetVolumeNameForVolumeMountPointA
GetShortPathNameA
GetConsoleAliasesW
GetStartupInfoA
FindFirstFileA
GetLastError
SetLastError
PeekConsoleInputW
SetVolumeLabelW
MoveFileW
CopyFileA
FreeUserPhysicalPages
SetComputerNameA
VerLanguageNameW
GetTempFileNameA
FindClose
CreateEventW
RemoveDirectoryW
HeapLock
GetCommMask
AddAtomA
FoldStringW
FoldStringA
FindNextFileA
SetConsoleTitleW
lstrcatW
FindNextFileW
VirtualProtect
QueryPerformanceFrequency
OpenSemaphoreW
ReadConsoleInputW
ReadConsoleOutputCharacterW
EnumSystemLocalesW
lstrcpyW
DeleteFileA
WriteConsoleW
FlushFileBuffers
GetStartupInfoW
GetSystemDefaultLangID
WideCharToMultiByte
HeapFree
HeapAlloc
GetProcAddress
ExitProcess
DecodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
WriteFile
GetModuleFileNameW
CloseHandle
FreeEnvironmentStringsW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
GetStringTypeW
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
RaiseException
RtlUnwind
HeapSize
SetStdHandle
CreateFileW
user32
CharUpperW
advapi32
AbortSystemShutdownW
Sections
.text Size: 744KB - Virtual size: 743KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ