Static task
static1
Behavioral task
behavioral1
Sample
fea4eb19fc8d86d9f1f3a27472bb0c2257122accf1ec0d926b274b6e19830cf7.exe
Resource
win10-20231023-en
General
-
Target
fea4eb19fc8d86d9f1f3a27472bb0c2257122accf1ec0d926b274b6e19830cf7
-
Size
260KB
-
MD5
56b2272ba231d738401752c75571e58a
-
SHA1
43844b43e7f4d70d866add719a018a1d6ca26690
-
SHA256
fea4eb19fc8d86d9f1f3a27472bb0c2257122accf1ec0d926b274b6e19830cf7
-
SHA512
4e9d48153c1817706b18b46e48c2fb2903355f2d17527ad1bb282db6b7bd6d48edbf16e48c324f08580f9dbc1d7bf1b4eb8bc3fa46c1772b72e29b7a17e1a234
-
SSDEEP
3072:B4kdtW0AToqCXa2i5O0F4Pk7HR2KKXEvt+xc5FE8DfA6q+UAtG9rrP:6knAT4XLJ+4M7H8KsEvAyFECfA6rm9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fea4eb19fc8d86d9f1f3a27472bb0c2257122accf1ec0d926b274b6e19830cf7
Files
-
fea4eb19fc8d86d9f1f3a27472bb0c2257122accf1ec0d926b274b6e19830cf7.exe windows:5 windows x86 arch:x86
4033761b3b79046d01d0af81d1d723d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetFileSize
GetCommModemStatus
FindFirstFileW
WriteConsoleInputW
WriteConsoleOutputCharacterW
BuildCommDCBAndTimeoutsA
InterlockedIncrement
ReadConsoleA
ZombifyActCtx
SetDefaultCommConfigW
GetNamedPipeHandleStateA
GetProfileSectionA
GetComputerNameW
GetProcessPriorityBoost
GetModuleHandleW
LocalFlags
GetPrivateProfileStringW
CreateActCtxW
GlobalAlloc
GetVolumeInformationA
GlobalFindAtomA
TerminateThread
SetConsoleCP
DeleteVolumeMountPointW
InterlockedPopEntrySList
SetProcessAffinityMask
GetConsoleAliasW
SetTimeZoneInformation
ReplaceFileA
CreateJobObjectA
GetLargestConsoleWindowSize
FindFirstFileA
GetLastError
SetLastError
GetProcAddress
SetFirmwareEnvironmentVariableW
VerLanguageNameW
LoadLibraryA
OpenWaitableTimerW
GetConsoleScreenBufferInfo
FoldStringA
WriteProfileStringA
GetProcessShutdownParameters
OpenFileMappingW
PeekConsoleInputA
GetCPInfoExA
SetProcessShutdownParameters
ReadConsoleInputW
GetWindowsDirectoryW
MoveFileWithProgressW
CloseHandle
WriteConsoleW
SetStdHandle
GlobalFlags
GetCommandLineW
FlushFileBuffers
GetConsoleMode
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
ExitProcess
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
IsProcessorFeaturePresent
HeapCreate
InitializeCriticalSectionAndSpinCount
LoadLibraryW
GetLocaleInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
GetConsoleCP
CreateFileW
user32
CharUpperW
CharToOemBuffA
advapi32
RevertToSelf
msimg32
AlphaBlend
Sections
.text Size: 190KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ