Static task
static1
Behavioral task
behavioral1
Sample
afa0cfb638d14c293319fdcc88c29bb8b98536d8f6cc9c4233958018f8016187.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
afa0cfb638d14c293319fdcc88c29bb8b98536d8f6cc9c4233958018f8016187.exe
Resource
win10-20240404-en
General
-
Target
afa0cfb638d14c293319fdcc88c29bb8b98536d8f6cc9c4233958018f8016187
-
Size
296KB
-
MD5
48c6c82e52d99efaf51fb1ee01ffe27d
-
SHA1
f209633001d97fb12f7d83183e232cf12e80dcc9
-
SHA256
afa0cfb638d14c293319fdcc88c29bb8b98536d8f6cc9c4233958018f8016187
-
SHA512
9c1741751115e3442aae47e48266cbbb71a3cbc091ecb70c77d3ea155d3c23b85e600d86455210e516d0e4772182517531e22a8d401972043cedb2d8e111e6c9
-
SSDEEP
3072:auk4mLTW0u4U/TTrItNdBzaGD3mJ4L/C25euOMuvzqZYj/F:c4mLG4i3rmrDO97MMzqZYj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource afa0cfb638d14c293319fdcc88c29bb8b98536d8f6cc9c4233958018f8016187
Files
-
afa0cfb638d14c293319fdcc88c29bb8b98536d8f6cc9c4233958018f8016187.exe windows:5 windows x86 arch:x86
d0eb7b8c702cd1b9d76bcc539912ddcb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigA
EnumCalendarInfoA
GetConsoleAliasesLengthW
VirtualQuery
GetCommState
HeapFree
GetComputerNameW
UnlockFile
WaitForSingleObjectEx
GetModuleHandleW
GetDateFormatA
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
IsValidLocale
GetLocaleInfoW
IsBadWritePtr
GetAtomNameW
FindNextVolumeMountPointW
SetCurrentDirectoryA
GetCurrentDirectoryW
GetLongPathNameW
GetProcAddress
GetProcessHeaps
BuildCommDCBW
LoadLibraryA
SetCalendarInfoW
GetModuleFileNameA
SetConsoleTitleW
FreeEnvironmentStringsW
BuildCommDCBA
VirtualProtect
FileTimeToLocalFileTime
HeapAlloc
Sleep
ExitProcess
GetStartupInfoW
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateFileA
CloseHandle
FlushFileBuffers
GetModuleHandleA
user32
LoadIconW
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 39.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ