Static task
static1
Behavioral task
behavioral1
Sample
cf252b05e408c089bc0814182984efa0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf252b05e408c089bc0814182984efa0N.exe
Resource
win10v2004-20240802-en
General
-
Target
cf252b05e408c089bc0814182984efa0N.exe
-
Size
229KB
-
MD5
cf252b05e408c089bc0814182984efa0
-
SHA1
37ac5935355c83bfc1347a8811366d8bef8bd02b
-
SHA256
f00cbe4864705f83db12bc0c3a8abb487c5762bdc27bf705e7cc6440d040feff
-
SHA512
2462b5c9953747f365f12dce345455d63bae909bab0a8a457de7ec5eb7c8173d3bc6650379d2bcc2b2f437a210acd86aa643102dcbdb56c54bc615403dab458e
-
SSDEEP
6144:CM8sY+Y3Y4P465o0IL7/uHpiWZhN5aZsJ:dY+Y3Y4g65o0e/uE4X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf252b05e408c089bc0814182984efa0N.exe
Files
-
cf252b05e408c089bc0814182984efa0N.exe.exe windows:5 windows x86 arch:x86
08c65621ab9694a1d228e295d729d0b5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
Sleep
VirtualFree
InitializeCriticalSection
LeaveCriticalSection
VirtualAlloc
EnterCriticalSection
DeleteCriticalSection
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
WriteFile
GetFileAttributesA
ReadFile
CreateDirectoryA
FindFirstFileA
FindClose
LocalAlloc
CloseHandle
LocalFree
lstrcpyA
Process32First
OpenProcess
lstrcmpiA
Process32Next
CreateToolhelp32Snapshot
HeapAlloc
HeapFree
GetProcessHeap
FormatMessageA
TerminateThread
InterlockedExchange
GlobalFree
PeekNamedPipe
CreateProcessA
TerminateProcess
GetSystemDirectoryA
DisconnectNamedPipe
GetStartupInfoA
WaitForMultipleObjects
CreatePipe
SetErrorMode
lstrcatA
GetSystemTime
MultiByteToWideChar
CreateThread
SetEndOfFile
GetLastError
lstrlenW
CreateEventA
GetStringTypeW
LCMapStringW
WriteConsoleW
FlushFileBuffers
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
CreateFileW
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
SetEvent
WaitForSingleObject
DecodePointer
EncodePointer
ExitThread
GetCurrentThreadId
GetProcAddress
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetStdHandle
GetModuleFileNameW
HeapSize
HeapReAlloc
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
LoadLibraryW
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
user32
CharNextA
advapi32
ImpersonateLoggedOnUser
OpenProcessToken
winhttp
WinHttpGetProxyForUrl
WinHttpOpen
WinHttpSetStatusCallback
WinHttpQueryHeaders
WinHttpCrackUrl
WinHttpConnect
WinHttpSendRequest
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSetOption
WinHttpReceiveResponse
WinHttpReadData
WinHttpAddRequestHeaders
WinHttpCloseHandle
WinHttpOpenRequest
iphlpapi
GetAdaptersInfo
GetAdaptersAddresses
Sections
.text Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ