Static task
static1
Behavioral task
behavioral1
Sample
f00b17829026124838d62c5d1f920a720476547d5e8309c5027614d29a416e05.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f00b17829026124838d62c5d1f920a720476547d5e8309c5027614d29a416e05.exe
Resource
win10v2004-20240426-en
General
-
Target
f00b17829026124838d62c5d1f920a720476547d5e8309c5027614d29a416e05
-
Size
10.5MB
-
MD5
400992e89f640ced83313c8d0cec106e
-
SHA1
abcc1616d181034b37b6e2aee2b274a4b241ed7f
-
SHA256
f00b17829026124838d62c5d1f920a720476547d5e8309c5027614d29a416e05
-
SHA512
8ef86fc13c10e0867111159265d0f6e3a011e35aa07b51aa94b6a52bf80272fff5a0339e3dea13e9c87a0c3f319d87014326256372dfb27bd2c74d58d7e42e15
-
SSDEEP
12288:xucqxGrf50Fqwswswswswswswswswswswswswswswswswswswswswswswswswswv:xuM6F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f00b17829026124838d62c5d1f920a720476547d5e8309c5027614d29a416e05
Files
-
f00b17829026124838d62c5d1f920a720476547d5e8309c5027614d29a416e05.exe windows:5 windows x86 arch:x86
80d951d4a8ff80b46e178f72a4b74c38
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexW
GetStringTypeA
GlobalCompact
_llseek
BuildCommDCBAndTimeoutsA
EnumCalendarInfoW
VerSetConditionMask
GetConsoleAliasA
GetCurrentActCtx
SetDefaultCommConfigW
WriteConsoleInputA
SetEvent
GetModuleHandleW
EnumTimeFormatsW
InitializeCriticalSection
GetFirmwareEnvironmentVariableA
LoadLibraryW
GetFileAttributesA
TransactNamedPipe
WritePrivateProfileSectionW
TerminateProcess
IsDBCSLeadByte
lstrcmpW
GlobalUnlock
SetCurrentDirectoryA
GetCPInfoExW
SetLastError
GetProcAddress
PeekConsoleInputW
SearchPathA
OpenWaitableTimerA
GetProcessId
LocalAlloc
FindFirstVolumeMountPointW
GlobalGetAtomNameW
AddAtomA
WaitForMultipleObjects
EnumResourceTypesW
GetPrivateProfileSectionNamesA
FindNextFileA
FreeEnvironmentStringsW
SetCalendarInfoA
GetWindowsDirectoryW
DeleteFileW
EnumCalendarInfoExA
CopyFileExA
SetStdHandle
WriteConsoleW
GetLastError
MoveFileA
HeapAlloc
DeleteFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
HeapDestroy
EncodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
GetCurrentThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapFree
Sleep
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
RtlUnwind
HeapSize
IsProcessorFeaturePresent
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
CreateFileW
user32
LoadMenuW
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10.3MB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ