Static task
static1
Behavioral task
behavioral1
Sample
cff33c098cae2d0a04f830c0940e2126ba02755d3b95ad04cbadea212f5f4d75.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
cff33c098cae2d0a04f830c0940e2126ba02755d3b95ad04cbadea212f5f4d75.exe
Resource
win10v2004-20231127-en
General
-
Target
cff33c098cae2d0a04f830c0940e2126ba02755d3b95ad04cbadea212f5f4d75
-
Size
2.5MB
-
MD5
03c5a41faeb8af02467a70124b007bea
-
SHA1
6e690016e24f0c4d965ad3c4f420e0163ddd3ea5
-
SHA256
cff33c098cae2d0a04f830c0940e2126ba02755d3b95ad04cbadea212f5f4d75
-
SHA512
58201eb470b76d0b01095b68dda8875e38046c5b6b7e5d99ce27b2208f0eb4a384d6b3cfaafe2c4a78f62e8b1f258ec2db22308a853256346dd13f1c90fd12f8
-
SSDEEP
49152:3n0HNGnf6C8klxAdXS5ADcj34CvdrgwfTOEBPD9jxbjZw5vj3:w8xBJKgLrjNp9jBcj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cff33c098cae2d0a04f830c0940e2126ba02755d3b95ad04cbadea212f5f4d75
Files
-
cff33c098cae2d0a04f830c0940e2126ba02755d3b95ad04cbadea212f5f4d75.exe windows:5 windows x64 arch:x64
6226879401e979c42c1f243b3c115079
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shlwapi
PathRemoveFileSpecW
SHGetValueA
PathFindFileNameW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
ws2_32
WSAGetLastError
WSACleanup
send
WSASetLastError
closesocket
recv
kernel32
Sleep
GetLastError
CloseHandle
LocalFree
GetTickCount
InitializeCriticalSectionAndSpinCount
OpenEventW
RaiseException
DecodePointer
DeleteCriticalSection
CreateFileW
UnmapViewOfFile
GetFileSize
CreateFileMappingW
MapViewOfFile
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
GetProcessHeap
ReadFile
SetNamedPipeHandleState
GetModuleFileNameW
WaitForSingleObject
CreateEventW
SetEvent
SetCurrentDirectoryW
EnterCriticalSection
LeaveCriticalSection
VirtualFree
VirtualAlloc
GetProcAddress
GetModuleHandleW
WideCharToMultiByte
GetModuleHandleA
LoadLibraryExA
FindResourceA
LockResource
LoadResource
FreeLibrary
lstrcmpiW
WriteFile
CreateMutexW
GetFileAttributesW
ReleaseMutex
GetSystemDirectoryW
OpenProcess
DeleteFileW
MultiByteToWideChar
GetCurrentThreadId
ResetEvent
UnhandledExceptionFilter
VerSetConditionMask
OpenMutexW
MapViewOfFileEx
VerifyVersionInfoW
GetTickCount64
SetLastError
GetFileType
GetStdHandle
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
DeleteFiber
GetCurrentProcessId
GetSystemTimeAsFileTime
QueryPerformanceCounter
ConvertFiberToThread
FindClose
FindFirstFileA
FindNextFileA
GetEnvironmentVariableW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
GetSystemTime
SystemTimeToFileTime
PeekNamedPipe
GetDriveTypeW
SetEndOfFile
GetFileAttributesExW
GetModuleHandleExW
ExitThread
RtlUnwindEx
RtlPcToFileHeader
LoadLibraryW
ReleaseSemaphore
GetCurrentProcess
SwitchToThread
ResumeThread
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
SetConsoleCtrlHandler
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
GetConsoleCP
SetFilePointerEx
GetCurrentDirectoryW
GetFullPathNameW
GetTimeZoneInformation
FlushFileBuffers
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
WriteConsoleW
SetFileAttributesW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
GetStringTypeW
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
OutputDebugStringW
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
LoadLibraryExW
GetVersionExW
VirtualProtect
InterlockedPopEntrySList
user32
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxA
shell32
SHGetSpecialFolderPathA
advapi32
CryptReleaseContext
CryptAcquireContextW
ReportEventA
RegisterEventSourceA
DeregisterEventSource
LookupPrivilegeValueW
AdjustTokenPrivileges
CreateServiceW
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
ChangeServiceConfig2W
DeleteService
ControlService
OpenProcessToken
StartServiceW
ChangeServiceConfigW
OpenServiceW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegisterServiceCtrlHandlerExW
SetServiceStatus
StartServiceCtrlDispatcherW
CryptGenRandom
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 727KB - Virtual size: 727KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.tvm0 Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ