Static task
static1
Behavioral task
behavioral1
Sample
f222207568b19472ec5889868ba892d425b045f915cc76577639bb221e999e20.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f222207568b19472ec5889868ba892d425b045f915cc76577639bb221e999e20.exe
Resource
win10v2004-20240802-en
General
-
Target
f222207568b19472ec5889868ba892d425b045f915cc76577639bb221e999e20
-
Size
570KB
-
MD5
f2f0eaca4f89e34053154261e5fdf7c5
-
SHA1
283cc18fce476b0cb446dd9d2f0de83336d04ec0
-
SHA256
f222207568b19472ec5889868ba892d425b045f915cc76577639bb221e999e20
-
SHA512
7a930a13806da9dd8fc1e415be1c64809c8f3d27ac7a115dd5dc3366f80d2dd1811e8879725e7b3280217f6e6908f176c28d31d32062b2ca8a14a1a7fbcb0d10
-
SSDEEP
3072:PCQWRYYcJ1GMUjsXW5svP++sSn7eVXrmlKgSiNlB527ybYUCj4r:qJaYk8MocPFf7eQKgPLB5v5Cj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f222207568b19472ec5889868ba892d425b045f915cc76577639bb221e999e20
Files
-
f222207568b19472ec5889868ba892d425b045f915cc76577639bb221e999e20.exe windows:5 windows x86 arch:x86
13fe133da882fdb354f390a8e8767e1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
kernel32
GetOEMCP
GetACP
GetCPInfo
HeapSize
Sleep
RtlUnwind
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
EncodePointer
HeapCreate
GetModuleFileNameW
WriteFile
DecodePointer
ExitProcess
GetModuleHandleW
HeapFree
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapReAlloc
LCMapStringW
GetStringTypeW
GetCurrentProcessId
FillConsoleOutputAttribute
GetConsoleScreenBufferInfo
LoadLibraryA
GetProcessHeaps
FillConsoleOutputCharacterA
GetProcAddress
GetLastError
GetStdHandle
MultiByteToWideChar
SetConsoleCursorPosition
CreateEventA
WaitForSingleObject
HeapAlloc
DeleteCriticalSection
user32
SetCursor
CopyRect
SetClipboardData
CloseClipboard
FillRect
DrawTextA
DrawIconEx
LoadStringA
CopyImage
GetClientRect
GetWindowTextLengthA
SendMessageA
BeginPaint
GetDC
SetRect
ReleaseDC
EmptyClipboard
EndDialog
DefWindowProcA
IsWindow
OpenClipboard
SetWindowTextA
gdi32
GetLayout
PatBlt
LineTo
SetTextColor
DeleteDC
DeleteObject
CreateCompatibleBitmap
FillRgn
GetStockObject
CreateSolidBrush
MoveToEx
CreatePolygonRgn
CreateCompatibleDC
SelectObject
oleaut32
SysFreeString
SysAllocStringLen
SysStringLen
comctl32
ord17
ord413
setupapi
SetupDiEnumDeviceInfo
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.shell Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ