Static task
static1
Behavioral task
behavioral1
Sample
f1224232a605c06b6b4fd83b11fc71bb27806b36ef091e67ec74a57634014676.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
f1224232a605c06b6b4fd83b11fc71bb27806b36ef091e67ec74a57634014676.exe
Resource
win10v2004-20231023-en
General
-
Target
f1224232a605c06b6b4fd83b11fc71bb27806b36ef091e67ec74a57634014676
-
Size
490KB
-
MD5
46b79b624186cf44fcba267559abd897
-
SHA1
e1ead1bd4f43283b39cbc174dd3c47acd26fa827
-
SHA256
f1224232a605c06b6b4fd83b11fc71bb27806b36ef091e67ec74a57634014676
-
SHA512
61bfa7f78c50c8c5036f82d899bfa6c11d748e021cca8494a5f7f3d11a3ef4494652e20c44fc8bc4f43c7f11d57e6fc6f4d6dcc53ab0e535163cd0be030a490f
-
SSDEEP
6144:pSjEWYhNi2Hb/FvqqHF/p/uwONct43j92UwL8pgTEHN/iHCTZiwDq/A:ojBYhDlz9pGHNu4B2Ui7uiHCT8/A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f1224232a605c06b6b4fd83b11fc71bb27806b36ef091e67ec74a57634014676
Files
-
f1224232a605c06b6b4fd83b11fc71bb27806b36ef091e67ec74a57634014676.exe windows:6 windows x86
0b1f3c4b9232aa49b641775cd97ebf19
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc140u
ord1523
ord5117
ord12559
ord1689
ord3009
ord5921
ord285
ord5850
ord2990
ord13656
ord7820
ord1692
ord14234
ord14131
ord8754
ord4477
ord8067
ord13654
ord4886
ord9418
ord8746
ord13878
ord6607
ord3932
ord2526
ord14377
ord6533
ord9210
ord9235
ord12173
ord9139
ord2760
ord13752
ord6218
ord3164
ord3403
ord3404
ord11396
ord11015
ord9040
ord12131
ord306
ord1046
ord5074
ord4664
ord12884
ord8360
ord3266
ord9256
ord11002
ord6978
ord12220
ord8965
ord14588
ord11936
ord3838
ord12089
ord9132
ord11726
ord11725
ord5652
ord10288
ord10284
ord10286
ord10287
ord10285
ord14785
ord2761
ord280
ord3302
ord3305
ord13756
ord6220
ord4225
ord8464
ord4912
ord1525
ord286
ord7495
ord2385
ord2389
ord11038
ord266
ord8470
ord8386
ord12865
ord8324
ord5357
ord2486
ord12541
ord12542
ord14589
ord7922
ord14595
ord9398
ord4152
ord4090
ord12947
ord7941
ord2034
ord11982
ord11983
ord14466
ord12531
ord8000
ord14667
ord6348
ord14669
ord6350
ord14668
ord6349
ord3852
ord5918
ord12239
ord12247
ord4589
ord8217
ord10433
ord12251
ord12219
ord12928
ord5249
ord5549
ord5760
ord9350
ord5525
ord5763
ord5252
ord5411
ord5228
ord7722
ord7723
ord7712
ord2409
ord5409
ord8219
ord10250
ord9209
ord6860
ord1113
ord6489
ord6566
ord3882
ord296
ord8210
ord265
ord4815
ord2304
ord1663
ord1111
ord1180
ord1045
ord4092
ord13911
ord7313
ord13442
ord952
ord2205
ord2272
ord7997
ord1472
ord995
ord4974
ord5019
ord1391
ord890
ord4942
ord14137
ord8062
ord4997
ord5013
ord4884
ord4954
ord4960
ord4966
ord4948
ord5003
ord1526
ord290
ord5422
ord3182
ord540
ord4885
ord10472
ord3833
ord3697
ord2246
ord2215
ord1002
ord4936
ord6589
ord10255
ord5984
ord5790
ord12168
ord3265
ord3371
ord3372
ord3941
ord12124
ord1777
ord1756
ord2682
ord5935
ord13703
ord11717
ord6877
ord14596
ord7923
ord14590
ord3055
ord4494
ord9693
ord1770
ord1744
ord4502
ord1722
ord4988
ord12258
ord462
ord4927
ord12262
ord7653
ord10379
ord1511
ord4227
ord1513
kernel32
DeleteCriticalSection
Sleep
CreateThread
GetNativeSystemInfo
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
GetProcAddress
GetLastError
InitializeCriticalSectionEx
OutputDebugStringW
MultiByteToWideChar
LocalFree
GetModuleFileNameW
SetFileAttributesW
DeleteFileW
CreateFileW
CloseHandle
ReadFile
GetFileAttributesW
CreateFileA
DeviceIoControl
CreatePipe
GetStartupInfoW
CreateProcessW
GetDriveTypeW
GetDiskFreeSpaceExW
CreateEventW
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
GetLogicalDrives
user32
LoadIconW
GetSystemMenu
AppendMenuW
SendMessageW
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetWindowRect
SetTimer
GetActiveWindow
KillTimer
GetCursorPos
LoadMenuW
GetSubMenu
EnableWindow
advapi32
CryptAcquireContextW
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptGetHashParam
CryptDestroyHash
comctl32
ImageList_ReplaceIcon
InitCommonControlsEx
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
CoSetProxyBlanket
oleaut32
SysAllocStringByteLen
SysAllocString
VariantClear
SysFreeString
SysStringLen
msvcp140
?_Xinvalid_argument@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
vcruntime140
__std_terminate
__std_exception_copy
__std_exception_destroy
strstr
memset
__CxxFrameHandler3
__current_exception_context
_except_handler4_common
memmove
_CxxThrowException
__current_exception
memchr
memcpy
api-ms-win-crt-heap-l1-1-0
_set_new_mode
malloc
free
api-ms-win-crt-runtime-l1-1-0
_initterm
_errno
_invalid_parameter_noinfo
_controlfp_s
terminate
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_seh_filter_exe
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
_set_app_type
_exit
exit
_initterm_e
_invalid_parameter_noinfo_noreturn
_get_wide_winmain_command_line
_initialize_wide_environment
_configure_wide_argv
api-ms-win-crt-convert-l1-1-0
strtol
wcstombs_s
atoi
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf_s
__p__commode
_set_fmode
__stdio_common_vsscanf
fopen_s
fgets
fclose
__stdio_common_vfprintf
api-ms-win-crt-filesystem-l1-1-0
_findclose
_findnext64i32
_findfirst64i32
api-ms-win-crt-time-l1-1-0
wcsftime
_time64
_localtime64_s
api-ms-win-crt-string-l1-1-0
strcat_s
wcscpy_s
strcpy_s
strncpy_s
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 299KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ