Static task
static1
Behavioral task
behavioral1
Sample
fffdf1835d7392c5219e52210e1defe69baaa05ea052e0e64e01fb6711ca4c6a.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
fffdf1835d7392c5219e52210e1defe69baaa05ea052e0e64e01fb6711ca4c6a.exe
Resource
win11-20240611-en
General
-
Target
fffdf1835d7392c5219e52210e1defe69baaa05ea052e0e64e01fb6711ca4c6a
-
Size
627KB
-
MD5
9e0f6f1ece6e43a25fca63d2feed8cfe
-
SHA1
c2793e586ee1168e53ae005969213e69da61737c
-
SHA256
fffdf1835d7392c5219e52210e1defe69baaa05ea052e0e64e01fb6711ca4c6a
-
SHA512
e74d54f851c0a092a630038a947f6866499d551d7468599864ab700fc0678ac1b29bb15b902d2ba9fc66dee3423bd11ffb38bb2f2f0b62e5a0e48a36ebd4d0c8
-
SSDEEP
12288:AlnXIR9D+nC8pqwRmMdUL0c77eyeH+2HcSfEY3DAshOTT+ZcOgKS/s:Am0C84wRmMaL0xrX8Sfd5sTPOhSk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource fffdf1835d7392c5219e52210e1defe69baaa05ea052e0e64e01fb6711ca4c6a
Files
-
fffdf1835d7392c5219e52210e1defe69baaa05ea052e0e64e01fb6711ca4c6a.exe windows:5 windows x86 arch:x86
1c3aebb846cbbabbc7cfe5a60c0dd715
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetComputerNameW
GetTickCount
GetNumberFormatA
GetWindowsDirectoryA
GetUserDefaultLangID
SetProcessPriorityBoost
TlsSetValue
GlobalAlloc
LoadLibraryW
AssignProcessToJobObject
GetACP
IsBadStringPtrA
OpenMutexW
GetLastError
SetLastError
GetProcAddress
BuildCommDCBW
LoadLibraryA
InterlockedExchangeAdd
GetDiskFreeSpaceA
FoldStringA
GetModuleFileNameA
FindFirstVolumeMountPointA
LoadLibraryExA
lstrcatW
OutputDebugStringA
WriteProcessMemory
HeapFree
EncodePointer
DecodePointer
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapAlloc
HeapCreate
Sleep
HeapSize
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
WideCharToMultiByte
GetCPInfo
GetOEMCP
IsValidCodePage
RaiseException
IsProcessorFeaturePresent
LCMapStringW
MultiByteToWideChar
GetStringTypeW
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 394KB - Virtual size: 447KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ