Static task
static1
Behavioral task
behavioral1
Sample
cf0ff7757caa6e9c768cc77430092e48b3bae2d866c5819fba33bd851d101f1d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
cf0ff7757caa6e9c768cc77430092e48b3bae2d866c5819fba33bd851d101f1d.exe
Resource
win10v2004-20231020-en
General
-
Target
cf0ff7757caa6e9c768cc77430092e48b3bae2d866c5819fba33bd851d101f1d
-
Size
103KB
-
MD5
f3917f4ba0f73e0a70ed113f106c3f80
-
SHA1
77b464c19c98bb19eaadba857fcbd4ed6fab7d8c
-
SHA256
cf0ff7757caa6e9c768cc77430092e48b3bae2d866c5819fba33bd851d101f1d
-
SHA512
5ee60fbb9a835bdb1757d8cb20ccf3622eb647fc4e89d1b6ab99a9ba4b991e50258d39ce78efd8c80eb7eb6b6302dce1cdde6aa02c667c5dcb2ca277c6505a27
-
SSDEEP
1536:Kyn1C4B1Mpp/WBpdu7y9JqI3KGNndfvLzMqUXnLrglG5Vr:JsSp7JqI3KG1NUv6G5Vr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf0ff7757caa6e9c768cc77430092e48b3bae2d866c5819fba33bd851d101f1d
Files
-
cf0ff7757caa6e9c768cc77430092e48b3bae2d866c5819fba33bd851d101f1d.exe windows:5 windows x86
7290b1a6a6c780c60b27d68177593edf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
GetCurrentProcess
FindClose
FindFirstFileA
GetShortPathNameA
CloseHandle
CreateFileA
lstrcpyA
GetModuleFileNameA
SetLastError
GetModuleHandleA
TerminateProcess
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetFilePointer
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
SetStdHandle
GetPrivateProfileSectionA
WritePrivateProfileSectionA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
GetLastError
InterlockedDecrement
GetCurrentThreadId
LocalFree
Sleep
GetProcAddress
LoadLibraryA
lstrlenA
WritePrivateProfileStringA
GetTickCount
FreeEnvironmentStringsW
GetPrivateProfileIntA
WinExec
DeleteFileA
SetEndOfFile
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
HeapSize
GetCurrentProcessId
QueryPerformanceCounter
ReadFile
ExitProcess
GetConsoleMode
GetConsoleCP
WriteFile
VirtualAlloc
VirtualFree
HeapCreate
GetFileType
GetStdHandle
HeapFree
GetProcessHeap
InterlockedIncrement
InterlockedExchange
RtlUnwind
GetSystemTimeAsFileTime
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapReAlloc
GetCommandLineA
GetStartupInfoA
LCMapStringA
LCMapStringW
GetCPInfo
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
SetHandleCount
GetEnvironmentStringsW
user32
DefWindowProcA
PostMessageA
CreateWindowExA
DestroyWindow
TranslateMessage
RegisterClassExA
GetMessageA
wsprintfA
DispatchMessageA
PostQuitMessage
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
oleaut32
VariantClear
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ