Static task
static1
Behavioral task
behavioral1
Sample
0023fae059d1f773242047c39ea7bf00N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0023fae059d1f773242047c39ea7bf00N.exe
Resource
win10v2004-20240709-en
General
-
Target
0023fae059d1f773242047c39ea7bf00N.exe
-
Size
989KB
-
MD5
0023fae059d1f773242047c39ea7bf00
-
SHA1
52b4fb3dced0e51e40979e3cce8cbdddca228227
-
SHA256
0fc2275df4c2ef05269b4aac462c17017d8f6dd727930bce0c3ba0427ee6f383
-
SHA512
113a567e3095e6c70c29ab27e648f9306f3816f8a837c20b11c326cdfc4c4011bf5b635d93a8a164068138db81c487de25ab97e17bc1c0978d14f0f76f299db1
-
SSDEEP
24576:IZqkmfSgwPrJ5YD+pktX4BbR7pimKhR7fWqTm5c6:IZqPfirJTeXObR7piThR7fRmc6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0023fae059d1f773242047c39ea7bf00N.exe
Files
-
0023fae059d1f773242047c39ea7bf00N.exe.exe windows:5 windows x86 arch:x86
e1f29e5c120d5bcc517a2977369da78e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
LeaveCriticalSection
lstrcmpiA
EnterCriticalSection
lstrlenA
GetVersion
LocalFileTimeToFileTime
SystemTimeToFileTime
GetLocalTime
FileTimeToSystemTime
FileTimeToLocalFileTime
SetEndOfFile
SetFilePointer
SetFileTime
GetDriveTypeA
GetConsoleScreenBufferInfo
GetStdHandle
ReadFile
SetConsoleMode
GetConsoleMode
WideCharToMultiByte
DosDateTimeToFileTime
SetFileAttributesA
GetFileAttributesA
GetFileTime
SetVolumeLabelA
CreateDirectoryA
DeleteFileA
SetEnvironmentVariableA
lstrcpynA
CreateMutexA
InterlockedExchange
WaitForSingleObject
ReleaseMutex
InitializeCriticalSection
GetCurrentProcess
CreateFileA
GetLastError
GetProcessHeap
HeapAlloc
HeapFree
GetFullPathNameA
CloseHandle
InterlockedDecrement
GetCPInfo
GetSystemTimeAsFileTime
MoveFileA
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
SetConsoleCtrlHandler
InterlockedIncrement
SetStdHandle
GetFileType
FindClose
FindFirstFileA
HeapReAlloc
GetCommandLineA
DeleteCriticalSection
VirtualFree
VirtualAlloc
HeapCreate
WriteFile
GetModuleFileNameA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStartupInfoA
GetTimeZoneInformation
RtlUnwind
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
FlushFileBuffers
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetCurrentDirectoryA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetLocaleInfoW
HeapSize
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
SetEnvironmentVariableW
user32
OemToCharA
CharToOemA
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetKernelObjectSecurity
SetKernelObjectSecurity
IsValidSecurityDescriptor
GetSecurityDescriptorControl
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 828KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ropf Size: 512B - Virtual size: 150B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ