Static task
static1
Behavioral task
behavioral1
Sample
f4af8f79c9b4f8e28cb7963f12e7bc9d5ed7dafcea44b83e96ce703311a7ceba.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral2
Sample
f4af8f79c9b4f8e28cb7963f12e7bc9d5ed7dafcea44b83e96ce703311a7ceba.exe
Resource
win11-20240730-en
General
-
Target
f4af8f79c9b4f8e28cb7963f12e7bc9d5ed7dafcea44b83e96ce703311a7ceba
-
Size
263KB
-
MD5
1b2c1ddd9cc1c11393a5daa17bc1d25b
-
SHA1
14668a7bed2427d58a99c8b9cf7a81e005810338
-
SHA256
f4af8f79c9b4f8e28cb7963f12e7bc9d5ed7dafcea44b83e96ce703311a7ceba
-
SHA512
8db794ffc315f60b828c95d9a2f75c8535cef0bc147c999cc0a3c4e3094d6933add7f36a32d5298e0c0cbe455bff9ecd7eafc9db53905772a1a05c5b195af6b1
-
SSDEEP
3072:AvFBuu/sLjF4bVefgW4H2LCuRJkE2J9GT/2rdKsBvupgV1cbA4ETB:iV0j8Vep4F4JkrTLBvupgVuYT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4af8f79c9b4f8e28cb7963f12e7bc9d5ed7dafcea44b83e96ce703311a7ceba
Files
-
f4af8f79c9b4f8e28cb7963f12e7bc9d5ed7dafcea44b83e96ce703311a7ceba.exe windows:5 windows x86 arch:x86
a69dd8d0e5233273a35e1c7d9c9f9afb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatA
EnumTimeFormatsW
GetConsoleCP
GlobalAlloc
LoadLibraryW
FatalAppExitW
HeapValidate
ReplaceFileW
GetModuleFileNameW
GetSystemDirectoryA
GlobalUnlock
LCMapStringA
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
IsBadHugeWritePtr
CreateJobSet
LoadLibraryA
CreateFileMappingA
SetConsoleCtrlHandler
CreateNamedPipeW
HeapWalk
SetEnvironmentVariableA
GetOEMCP
GetModuleHandleA
GetProcessShutdownParameters
EnumResourceNamesA
EnumDateFormatsW
PeekConsoleInputA
SetFileShortNameA
GetDiskFreeSpaceExW
GetCurrentProcessId
HeapSize
GetProcessHeap
SetEndOfFile
WriteConsoleW
GetTickCount
GetProcessPriorityBoost
CreateFileA
CreateJobObjectW
AddAtomW
EnumResourceNamesW
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetModuleHandleW
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapAlloc
RtlUnwind
SetFilePointer
HeapCreate
HeapFree
CloseHandle
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
GetStringTypeW
Sleep
RaiseException
GetConsoleMode
ReadFile
SetStdHandle
FlushFileBuffers
CreateFileW
user32
ChangeMenuW
GetMessageExtraInfo
DrawStateA
CharUpperBuffA
GetMenuState
GetSysColorBrush
WindowFromDC
GetComboBoxInfo
SetCaretPos
gdi32
CreateDCA
CreateDCW
GetCharWidthI
advapi32
ClearEventLogW
Sections
.text Size: 158KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 36.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.biwez Size: 1024B - Virtual size: 723B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sote Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ