Static task
static1
Behavioral task
behavioral1
Sample
cfe3c5506b5493663692641eabc5cdef87fd19c85e0f5d7d28784db02ae5462a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cfe3c5506b5493663692641eabc5cdef87fd19c85e0f5d7d28784db02ae5462a.exe
Resource
win10v2004-20240709-en
General
-
Target
cfe3c5506b5493663692641eabc5cdef87fd19c85e0f5d7d28784db02ae5462a
-
Size
196KB
-
MD5
993b336ce8f5916850a6cf9bc68b435a
-
SHA1
ed6f002037a3e4ca972474768a47dd04137308fc
-
SHA256
cfe3c5506b5493663692641eabc5cdef87fd19c85e0f5d7d28784db02ae5462a
-
SHA512
7ae6d96f9c64d8e985645f53036e831c2e687ccf75bea194a451a5d9311c72df6ccb55e918289e625217d9ed673104296b509d4c0c918e2e6fb110f82005a025
-
SSDEEP
3072:avEaSv+bYK0fkqw3QaJm4LCJsh+VkcgkzGrdTC7oxLMy2sc1ZW:HaLbY1cqw35mUOy2syZW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cfe3c5506b5493663692641eabc5cdef87fd19c85e0f5d7d28784db02ae5462a
Files
-
cfe3c5506b5493663692641eabc5cdef87fd19c85e0f5d7d28784db02ae5462a.exe windows:4 windows x86 arch:x86
93989dee74e2c4efb4d4920f2dc44a4a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetLocalTime
LoadLibraryA
Sleep
SetUnhandledExceptionFilter
lstrcmpiA
GetCommandLineA
InterlockedIncrement
GetCurrentThreadId
GlobalUnlock
GlobalLock
GlobalAlloc
FlushInstructionCache
HeapAlloc
CreateThread
LocalFree
GetStartupInfoA
GetModuleHandleA
GetLastError
VirtualQuery
GetModuleFileNameA
WaitForSingleObject
GetDiskFreeSpaceExA
InterlockedDecrement
HeapFree
SetEvent
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
OpenProcess
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
GetCurrentProcessId
OutputDebugStringA
EnterCriticalSection
LeaveCriticalSection
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
CreateEventA
LoadLibraryExA
GetProcAddress
FreeLibrary
GlobalFree
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GetProcessHeap
lstrlenA
user32
DispatchMessageA
PostMessageA
SendMessageA
SetWindowLongA
GetWindowThreadProcessId
GetParent
CallWindowProcA
CreateWindowExA
ShowWindow
SetFocus
IntersectRect
EqualRect
OffsetRect
DestroyWindow
SetWindowPos
UnionRect
PtInRect
GetKeyState
BeginPaint
GetClientRect
EndPaint
InvalidateRect
IsWindow
GetFocus
IsChild
GetMessageA
SetWindowRgn
wsprintfA
CharNextA
PostThreadMessageA
GetWindowLongA
DefWindowProcA
gdi32
SetWindowExtEx
CloseMetaFile
DeleteMetaFile
CreateRectRgnIndirect
GetDeviceCaps
LPtoDP
SaveDC
SetMapMode
SetWindowOrgEx
TextOutA
SetTextAlign
Rectangle
RestoreDC
DeleteDC
CreateMetaFileA
SetViewportOrgEx
comdlg32
GetOpenFileNameA
GetSaveFileNameA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ole32
OleRegGetMiscStatus
CoTaskMemAlloc
CreateOleAdviseHolder
OleRegGetUserType
CreateDataAdviseHolder
OleRegEnumVerbs
CoTaskMemFree
CoInitialize
CoUninitialize
oleaut32
SysFreeString
GetErrorInfo
SetErrorInfo
SysAllocStringLen
SysAllocString
VariantInit
CreateErrorInfo
VariantChangeType
OleCreatePropertyFrame
VariantClear
SysStringLen
LoadRegTypeLi
videowindow
CreateVideoWindow
ReleaseVideoWindow
surveillance
CleanupApp
ReleaseTransImp
GetTransModuleImp
InitApp
atl
ord21
ord43
ord44
ord51
ord50
ord46
ord27
ord26
ord31
ord30
ord58
ord32
ord20
ord17
ord57
ord23
ord16
ord18
msvcp60
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDH@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??1_Lockit@std@@QAE@XZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0_Lockit@std@@QAE@XZ
msvcrt
strncpy
memset
__CxxFrameHandler
??1type_info@@UAE@XZ
_snprintf
strlen
malloc
memcpy
sprintf
_ftol
??2@YAPAXI@Z
free
strcmp
abs
strstr
_access
strcpy
_mbsrchr
_purecall
memcmp
realloc
_except_handler3
?terminate@@YAXXZ
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
wcslen
_CxxThrowException
strcat
winmm
PlaySoundA
timeBeginPeriod
timeSetEvent
timeKillEvent
shlwapi
PathAppendA
PathRemoveFileSpecA
PathAddBackslashA
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 394KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ