Static task
static1
Behavioral task
behavioral1
Sample
spf.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
spf.exe
Resource
win10v2004-20240709-en
General
-
Target
spf.exe
-
Size
73.9MB
-
MD5
ba9b0e302b97bdf4a58b9de813e7ea71
-
SHA1
2e7c64aefb5a0670c584d24634494a6c307ad63e
-
SHA256
08db1e3037a5a12bf5e3e92236f492ae26f50c371151d9199b2103d085daff8c
-
SHA512
be69ca9fa294f579ed93cafb16f8440ac5ab5f54b8001374c6512c165fc549f4a112692448d43a010859c3a743ca2db4a6e182639a6f5f7794f507a690128c00
-
SSDEEP
1572864:urDzVmW3X327d9pkSXkgfTY3zzoqDv6bnRar6ZT5jXkJl5:urDZ3ckSUgbYPoHcr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource spf.exe
Files
-
spf.exe.exe windows:6 windows x64 arch:x64
Password: infected
a5d791d40e4fb22ae4fe50cb2ee0437b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shell32
SHFileOperationW
advapi32
LookupAccountNameW
ole32
CreateStreamOnHGlobal
oleaut32
VariantInit
comdlg32
PrintDlgW
wininet
HttpQueryInfoA
ws2_32
gethostname
ntdll
RtlCaptureContext
kernel32
GetVersionExW
user32
CallNextHookEx
gdi32
CreateCompatibleBitmap
winspool.drv
ord203
shlwapi
SHDeleteKeyA
iphlpapi
GetTcpTable
userenv
GetUserProfileDirectoryW
urlmon
URLDownloadToFileW
winmm
timeBeginPeriod
oleacc
AccessibleObjectFromWindow
comctl32
ImageList_GetIconSize
imm32
ImmSetCandidateWindow
usp10
ScriptShape
bcrypt
BCryptGenRandom
gdiplus
GdipGetSmoothingMode
tbs
Tbsi_Context_Create
netapi32
NetUserAdd
rpcrt4
UuidFromStringA
slwga
SLIsGenuineLocal
secur32
LsaGetLogonSessionData
crypt32
CertDuplicateCertificateContext
version
VerQueryValueW
wldap32
ord50
Sections
.text Size: - Virtual size: 10.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 10.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sysc Size: - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.*| Size: - Virtual size: 40.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.8i: Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.-[= Size: 73.9MB - Virtual size: 73.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 304B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ