Static task
static1
Behavioral task
behavioral1
Sample
spf.exe
Resource
win10v2004-20240802-en
General
-
Target
spf.exe
-
Size
74.6MB
-
MD5
7209b0c02ea86a356bf2e5f79b051e18
-
SHA1
adb7dbd7dc6023e12375cab9150b19b15a9967ac
-
SHA256
09c7e6250a3b6efa5397ea6f4b3e754156c30f249ee85ea4521bb5c6a976f49a
-
SHA512
8bd43283470ed4ab7882784f9af180c7633cc1d1c7e659b26636413be32d9ad62036e21183be7c972ff8809cfaa6c75329c720fae81799f97b7e97a3add68646
-
SSDEEP
1572864:QfbRQ04GOLYizQ9EUrrY9C5Pa4i16HZRWGZfLERvkJrMB8y29dR:G4GUnUrrYE5Q16vjfikJABK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource spf.exe
Files
-
spf.exe.exe windows:6 windows x64 arch:x64
a5d791d40e4fb22ae4fe50cb2ee0437b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
shell32
SHFileOperationW
advapi32
LookupAccountNameW
ole32
CreateStreamOnHGlobal
oleaut32
VariantInit
comdlg32
PrintDlgW
wininet
HttpQueryInfoA
ws2_32
gethostname
ntdll
RtlCaptureContext
kernel32
GetVersionExW
user32
CallNextHookEx
gdi32
CreateCompatibleBitmap
winspool.drv
ord203
shlwapi
SHDeleteKeyA
iphlpapi
GetTcpTable
userenv
GetUserProfileDirectoryW
urlmon
URLDownloadToFileW
winmm
timeBeginPeriod
oleacc
AccessibleObjectFromWindow
comctl32
ImageList_GetIconSize
imm32
ImmSetCandidateWindow
usp10
ScriptShape
bcrypt
BCryptGenRandom
gdiplus
GdipGetSmoothingMode
tbs
Tbsi_Context_Create
netapi32
NetUserAdd
rpcrt4
UuidFromStringA
slwga
SLIsGenuineLocal
secur32
LsaGetLogonSessionData
crypt32
CertDuplicateCertificateContext
version
VerQueryValueW
wldap32
ord50
Sections
.text Size: - Virtual size: 10.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 10.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sysc Size: - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WR: Size: - Virtual size: 40.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.(}R Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.R~T Size: 74.6MB - Virtual size: 74.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ