Static task
static1
Behavioral task
behavioral1
Sample
fd2faa9dc9ba18fb237e57fb91c75ce67dc9f016f2e406ffc2a335ae0752f5b3.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fd2faa9dc9ba18fb237e57fb91c75ce67dc9f016f2e406ffc2a335ae0752f5b3.exe
Resource
win10v2004-20240508-en
General
-
Target
fd2faa9dc9ba18fb237e57fb91c75ce67dc9f016f2e406ffc2a335ae0752f5b3
-
Size
432KB
-
MD5
2a2d7c36940094fa44044159794bcdb9
-
SHA1
a33a4627bcdd617a7e915fe5e93ca9afaf2988ae
-
SHA256
fd2faa9dc9ba18fb237e57fb91c75ce67dc9f016f2e406ffc2a335ae0752f5b3
-
SHA512
db4c87724087b95438b8d6052012c0c4512d0c3e897620b49a0f3feac3755352ebff004b8c0b72166759e37687486e986dcbd2ff01dda1dd34410383e875af9b
-
SSDEEP
6144:pNjDP2HE/zr4azmLVkwc/+rRTkfu7oSMQ8xZz9IPqfanWA:pNH2k//4azmOwcdxJQAZz9KN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd2faa9dc9ba18fb237e57fb91c75ce67dc9f016f2e406ffc2a335ae0752f5b3
Files
-
fd2faa9dc9ba18fb237e57fb91c75ce67dc9f016f2e406ffc2a335ae0752f5b3.exe windows:5 windows x86 arch:x86
df1b95ece6950542513c3297c624b239
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateThread
LeaveCriticalSection
GetCurrentThreadId
WaitForMultipleObjects
GetStdHandle
ReadFile
ExitProcess
GetFileSize
GetCommandLineW
CreatePipe
SetEvent
ExitThread
GetModuleHandleW
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
lstrlenW
GetTempPathW
LoadLibraryW
GetProcAddress
GetCurrentProcess
QueryDosDeviceW
GetFullPathNameW
GetLongPathNameW
GetModuleFileNameW
GetEnvironmentVariableW
GetCurrentProcessId
MoveFileExW
ExpandEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesW
GetVersion
VirtualAlloc
HeapCreate
LoadLibraryA
HeapAlloc
GetFileInformationByHandle
CopyFileW
DeleteFileW
EnterCriticalSection
CreateFileW
SetFilePointer
InterlockedCompareExchange
InterlockedExchange
DeleteCriticalSection
CreateProcessW
CreateFileA
GetProcessHeap
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
HeapReAlloc
VirtualFree
GetModuleFileNameA
ResetEvent
CreateThread
SetProcessShutdownParameters
CreateEventW
InitializeCriticalSection
SetUnhandledExceptionFilter
SetErrorMode
GetTickCount
IsBadWritePtr
WaitForSingleObject
HeapSize
SetLastError
TlsFree
TlsSetValue
TlsAlloc
LocalFree
TlsGetValue
GetStringTypeW
LCMapStringW
LCMapStringA
GetCPInfo
RtlUnwind
RaiseException
GetStartupInfoW
HeapFree
IsDebuggerPresent
SetFileAttributesW
WriteFile
GetLastError
Sleep
GetSystemInfo
GetDiskFreeSpaceExW
GetDriveTypeW
GetLogicalDriveStringsW
GlobalMemoryStatusEx
GetSystemTimeAsFileTime
CloseHandle
GetFileTime
GetVersionExW
GetVolumeInformationW
GetVolumePathNameW
GetSystemDirectoryW
InterlockedDecrement
UnhandledExceptionFilter
TerminateProcess
InterlockedIncrement
user32
EndPaint
RedrawWindow
GetSystemMetrics
LoadIconW
LoadImageW
SetFocus
GetSysColorBrush
SetTimer
EnableWindow
GetForegroundWindow
SendMessageW
MessageBoxW
FlashWindow
AttachThreadInput
SetCursor
CharLowerW
DefWindowProcW
ShowWindow
DestroyWindow
PostMessageW
KillTimer
LoadCursorW
SetRect
GetSysColor
BeginPaint
RegisterClassExW
DrawIconEx
AdjustWindowRectEx
CreateWindowExW
SetParent
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
SetWindowTextW
GetWindowLongW
SetWindowPos
PostQuitMessage
SetWindowLongW
gdi32
GetStockObject
GetObjectW
SelectObject
CreateBitmap
CreateCompatibleDC
BitBlt
SetDIBitsToDevice
CreateFontIndirectW
gdiplus
GdiplusStartup
GdipGetImageHeight
GdipGetImageWidth
GdipLoadImageFromStream
GdipFillRectangleI
GdipDeleteGraphics
GdipDrawImageRectI
GdipDisposeImage
GdipCreateSolidFill
GdipDeleteBrush
GdiplusShutdown
GdipCreateFromHDC
shlwapi
StrCpyW
AssocQueryStringW
PathCreateFromUrlW
comctl32
InitCommonControlsEx
comdlg32
GetSaveFileNameW
advapi32
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CryptGenRandom
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextW
RegEnumKeyExW
shell32
ord680
ShellExecuteW
ord190
SHOpenFolderAndSelectItems
ord155
SHGetFolderPathW
ole32
OleSetContainedObject
OleCreate
OleLockRunning
CoInitializeEx
CoSetProxyBlanket
CoTaskMemFree
GetHGlobalFromStream
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
wininet
HttpOpenRequestW
HttpSendRequestW
InternetQueryOptionW
InternetCloseHandle
HttpQueryInfoW
InternetReadFile
InternetConnectW
InternetSetOptionW
InternetOpenW
HttpQueryInfoA
powrprof
CallNtPowerInformation
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ