Static task
static1
General
-
Target
fjoiner.exe
-
Size
205KB
-
MD5
5174b3427fdede13da5c0727f817fcbf
-
SHA1
a07bb00ea9949deb5e4650b001a697f9352573d6
-
SHA256
bbda92a910754af00efd2f6be4298d211abf2c773068017044871f8f4c1ed2ef
-
SHA512
f10eb5831a78b68f1a2117ae167675620c698e961567264b142fe0dba39c4880e9df55ef0f1a9cf87d8b82a69426d310cc31b58f9d5846c09b5e734863bcef98
-
SSDEEP
6144:vAF5lcpvMguBvlZ8HojoxGBopppp0AQZ4T/Uxa:4F5lcpvevoj/Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fjoiner.exe
Files
-
fjoiner.exe.exe windows:5 windows x64 arch:x64
33c47a3c037fcb1f362ec68591e7e543
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
wininet
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
InternetOpenW
kernel32
SetFilePointer
WriteFile
WideCharToMultiByte
GetFileAttributesW
ReadFile
CreateFileW
MultiByteToWideChar
GetTempPathW
GetLastError
CloseHandle
GetVersion
DeleteFileW
GetFileInformationByHandle
CreateThread
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetCommandLineW
HeapCreate
HeapSetInformation
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
RtlUnwindEx
ExitProcess
HeapSize
Sleep
FlsAlloc
GetCurrentThreadId
SetLastError
FlsFree
FlsSetValue
FlsGetValue
DecodePointer
EncodePointer
RtlPcToFileHeader
RaiseException
HeapAlloc
HeapFree
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
GetUserDefaultUILanguage
FindNextFileW
FindClose
GetPrivateProfileIntW
GetModuleFileNameW
GetPrivateProfileStringW
FindFirstFileW
lstrcmpW
GetProcAddress
GetModuleHandleW
QueryPerformanceCounter
GetCommandLineA
user32
SetMenuItemInfoW
SetWindowTextW
UpdateWindow
CheckMenuItem
wsprintfW
wsprintfA
ClientToScreen
DestroyWindow
SetWindowPlacement
SetCursor
GetWindowTextLengthW
SetTimer
ScreenToClient
GetWindowRect
GetMessageW
PostQuitMessage
TrackPopupMenu
RegisterWindowMessageW
LoadImageW
PostMessageW
KillTimer
DialogBoxParamW
TrackMouseEvent
LoadCursorW
GetClientRect
PtInRect
GetDC
TranslateMessage
IsDialogMessageW
LoadIconW
GetWindowPlacement
GetAsyncKeyState
LoadMenuW
GetWindowTextW
SystemParametersInfoW
ReleaseDC
EnableMenuItem
GetMenuState
EndDialog
SetWindowPos
CheckDlgButton
ShowWindow
GetSysColorBrush
IsDlgButtonChecked
CreateDialogParamW
CreateWindowExW
CheckRadioButton
MessageBoxW
GetSystemMetrics
SetWindowLongPtrW
SetWindowTextA
EnableWindow
DestroyMenu
GetDlgCtrlID
DestroyIcon
CallWindowProcW
DispatchMessageW
GetSubMenu
IsWindowEnabled
GetMenu
AppendMenuW
GetDlgItem
DrawMenuBar
SendMessageW
gdi32
SetTextColor
GetDeviceCaps
SetBkMode
DeleteObject
CreateFontIndirectW
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyExW
shell32
SHFileOperationW
SHBrowseForFolderW
SHChangeNotify
ShellExecuteW
SHGetPathFromIDListW
DragQueryFileW
DragQueryPoint
DragFinish
ShellExecuteA
ole32
CoUninitialize
CoInitialize
CoTaskMemFree
CoCreateInstance
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ