Static task
static1
Behavioral task
behavioral1
Sample
f3dcf09074da67389982a149c854a2d7d8be06558b46bdf3e68088aac481ac02.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3dcf09074da67389982a149c854a2d7d8be06558b46bdf3e68088aac481ac02.exe
Resource
win10v2004-20240226-en
General
-
Target
f3dcf09074da67389982a149c854a2d7d8be06558b46bdf3e68088aac481ac02
-
Size
249KB
-
MD5
ed48764df779db80fd356569257d5771
-
SHA1
3f132ec7f41b395b8ab9be6bba95a2a4a9875770
-
SHA256
f3dcf09074da67389982a149c854a2d7d8be06558b46bdf3e68088aac481ac02
-
SHA512
6e808aff63c974bef359980251f153080121892edc7e14f179ed74768551893da8e3c25296c23026f66e2a9591e03d7991ab55035697a0c0ed7c5a299ec8ab10
-
SSDEEP
3072:ZLDwYSFDa/vslfqX9hYJiF9xBm2Ef5ayn8Tfd01LqciU+DGZq2CHv5p4HVP0dAhx:NDwYSFZ0hlbynMd01LHZq2xQAh7F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f3dcf09074da67389982a149c854a2d7d8be06558b46bdf3e68088aac481ac02
Files
-
f3dcf09074da67389982a149c854a2d7d8be06558b46bdf3e68088aac481ac02.exe windows:5 windows x86 arch:x86
9b42deeb06a537fa31a8314a155c8e61
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateThread
TerminateProcess
GetMailslotInfo
GetProcAddress
AddAtomW
OutputDebugStringA
LoadLibraryW
CompareStringW
CompareStringA
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetStringTypeW
GlobalAlloc
GetSystemTimes
GetCPInfo
GlobalMemoryStatus
GetModuleHandleW
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
EnterCriticalSection
LeaveCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
CloseHandle
CreateFileA
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoW
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
ReadFile
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
SetEnvironmentVariableA
user32
ShowWindow
UpdateWindow
FindWindowA
GetMonitorInfoW
SetActiveWindow
gdi32
FlattenPath
GetMapMode
GetGraphicsMode
BeginPath
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE