Static task
static1
Behavioral task
behavioral1
Sample
fe068e324cd4175f857dfee4c23512ed01f3abbf8b6138b715caa1ba5e9486c0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe068e324cd4175f857dfee4c23512ed01f3abbf8b6138b715caa1ba5e9486c0.exe
Resource
win10v2004-20240226-en
General
-
Target
fe068e324cd4175f857dfee4c23512ed01f3abbf8b6138b715caa1ba5e9486c0
-
Size
140KB
-
MD5
1cf3ff8141a065e2e9e312102a462804
-
SHA1
5a228dcacc5e6673b7ab4d48bf8435d0c61b2ca7
-
SHA256
fe068e324cd4175f857dfee4c23512ed01f3abbf8b6138b715caa1ba5e9486c0
-
SHA512
9a817674685c37b5305771f31264b3968f21f69eee4717593f4e60583cde1071316294404b8a4fbe7454eebc65e23fcecc3ccc39a185d7fb271fd04e8bffd5cf
-
SSDEEP
3072:bGbv70Gk1awhvv5hDrKg6+NwkS8W/ZSqjmwSAhVtemKXurNoQN:b+Sn5rKEN+8wnjdS9CxoQN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe068e324cd4175f857dfee4c23512ed01f3abbf8b6138b715caa1ba5e9486c0
Files
-
fe068e324cd4175f857dfee4c23512ed01f3abbf8b6138b715caa1ba5e9486c0.exe windows:6 windows x86 arch:x86
18f7be873ea0c8c15264c3aede79d058
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetUserNameA
GetCurrentHwProfileA
MapGenericMask
DuplicateToken
OpenProcessToken
AccessCheck
GetFileSecurityA
shlwapi
PathAppendW
PathFindFileNameA
PathFindFileNameW
shell32
SHCreateDirectoryExW
ole32
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoInitializeEx
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
kernel32
CreateFileW
DecodePointer
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetFilePointerEx
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
Sleep
LoadLibraryA
GetVolumeInformationA
GetWindowsDirectoryA
GetComputerNameA
GetModuleFileNameA
MoveFileA
FindFirstFileW
FindNextFileW
TerminateProcess
GetModuleFileNameW
FindClose
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
DeleteFileA
DeleteFileW
Process32FirstW
CloseHandle
CopyFileW
QueryFullProcessImageNameW
VirtualFree
GetCurrentProcess
WriteFile
VirtualAlloc
MultiByteToWideChar
GetLastError
CreateFileA
WideCharToMultiByte
CreateProcessA
LocalFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetACP
RtlUnwind
RaiseException
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetFileType
CompareStringW
LCMapStringW
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
WriteConsoleW
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ