Static task
static1
Behavioral task
behavioral1
Sample
d8017cf85ee023139b21501fb3f2a5bf32f4071499818caad60054862d0c9788.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d8017cf85ee023139b21501fb3f2a5bf32f4071499818caad60054862d0c9788.exe
Resource
win10v2004-20231023-en
General
-
Target
d8017cf85ee023139b21501fb3f2a5bf32f4071499818caad60054862d0c9788
-
Size
5.9MB
-
MD5
0227b22c5602047f38ecd8ea96d34436
-
SHA1
3a3dc8edac8dca1732b1099fd48dc492ae22efe4
-
SHA256
d8017cf85ee023139b21501fb3f2a5bf32f4071499818caad60054862d0c9788
-
SHA512
42187306412e66f50a8ec19e2a926b66c54411a8ba37b3294b9d3048762f84c8201b6286b998ff7df63b1281a2db4d5a90f20a090cdc20f7c8bb57a92ebdda21
-
SSDEEP
98304:hAGMzmuqd3334GlDf7JsMK0iIz1P/d2xiR1VbxadfdmUHMbmrfYo+7:hAGMzmuqd3334YDlsEz1EiRPla5YUHEB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d8017cf85ee023139b21501fb3f2a5bf32f4071499818caad60054862d0c9788
Files
-
d8017cf85ee023139b21501fb3f2a5bf32f4071499818caad60054862d0c9788.exe windows:6 windows x64
0c1bd7ee890e0afffead3c816c46eeeb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
FreeLibrary
VerifyVersionInfoW
LoadLibraryExW
CreateDirectoryW
SizeofResource
FindFirstFileW
FindNextFileW
WriteFile
TerminateProcess
RemoveDirectoryW
GetModuleFileNameW
K32GetModuleFileNameExW
GetTempPathW
InitializeCriticalSectionEx
FindClose
WaitForSingleObject
CreateFileW
GetFileAttributesW
OpenProcess
CreateToolhelp32Snapshot
Sleep
GetLastError
Process32NextW
GetDiskFreeSpaceExW
LockResource
GlobalAlloc
DeleteFileW
Process32FirstW
CloseHandle
RaiseException
VerSetConditionMask
FindResourceW
DecodePointer
GlobalLock
LocalFree
DeleteCriticalSection
GetModuleHandleW
GlobalUnlock
SetDllDirectoryW
MulDiv
GetExitCodeProcess
SetThreadLocale
SetThreadUILanguage
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetFileSizeEx
SetLastError
RegisterWaitForSingleObject
SetFilePointer
GetCurrentThreadId
CreateEventW
GetLocalTime
UnregisterWaitEx
GetCurrentProcessId
FormatMessageA
MoveFileW
MultiByteToWideChar
WideCharToMultiByte
SetSearchPathMode
GetCurrentDirectoryW
LoadResource
GetProcAddress
LoadLibraryW
QueryDepthSList
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
GetFileAttributesExW
ReadFile
SetFileAttributesW
SystemTimeToFileTime
IsDebuggerPresent
OutputDebugStringW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetStringTypeW
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
GetCurrentProcess
SwitchToThread
GetCurrentThread
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
EncodePointer
CompareStringW
LCMapStringW
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
InterlockedPushEntrySList
InterlockedFlushSList
SetFileTime
TzSpecificLocalTimeToSystemTime
GetFileType
ExitProcess
GetModuleHandleExW
GetStdHandle
CreateThread
ExitThread
FreeLibraryAndExitThread
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapFree
SetFilePointerEx
HeapAlloc
ReadConsoleW
SetStdHandle
GetTimeZoneInformation
HeapReAlloc
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
HeapSize
SetEndOfFile
WriteConsoleW
CreateTimerQueue
SetEvent
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
UnregisterWait
GetThreadTimes
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
comdlg32
PrintDlgW
oleaut32
SysAllocString
SysFreeString
Sections
.text Size: 376KB - Virtual size: 376KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 81.2MB - Virtual size: 81.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ