Static task
static1
Behavioral task
behavioral1
Sample
cf9baebe80b45dbea3a9f4031f561f56c57ac27bc2ad3569bf056cb2d6efae63N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf9baebe80b45dbea3a9f4031f561f56c57ac27bc2ad3569bf056cb2d6efae63N.exe
Resource
win10v2004-20240802-en
General
-
Target
cf9baebe80b45dbea3a9f4031f561f56c57ac27bc2ad3569bf056cb2d6efae63N
-
Size
148KB
-
MD5
fa4899e4eabda4ba48efbed9fb994b80
-
SHA1
a384fd5e44a947e6a00c418e66fb124b98c25b1b
-
SHA256
cf9baebe80b45dbea3a9f4031f561f56c57ac27bc2ad3569bf056cb2d6efae63
-
SHA512
1c3b5e0c1fb68f31665b0c1ed708be195e8ee8f9beb48c4aa72ec680e719eb017bc10ca6d7e31e21c862f30bfac81aa89bc1b62199943678e0789bfe57dc7296
-
SSDEEP
3072:EQtFnrXvP3R5UMKqSlfQ3Ll6TBftcxTslKx4:1ttrfPh5U6ufQh6TBlmzx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf9baebe80b45dbea3a9f4031f561f56c57ac27bc2ad3569bf056cb2d6efae63N
Files
-
cf9baebe80b45dbea3a9f4031f561f56c57ac27bc2ad3569bf056cb2d6efae63N.exe windows:4 windows x86 arch:x86
440a5f734e9183e740cab5f51d4bf879
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetTickCount
GetStartupInfoA
CreatePipe
TerminateProcess
DisconnectNamedPipe
PeekNamedPipe
WaitForMultipleObjects
GetVersionExA
ReleaseMutex
SetErrorMode
lstrcmpiA
GetCurrentThreadId
GetLocalTime
GetSystemTime
SetEnvironmentVariableA
CompareStringW
HeapAlloc
GetTimeZoneInformation
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
HeapCreate
HeapDestroy
HeapFree
TerminateThread
GetSystemDirectoryA
SetLastError
GetCurrentProcess
GetModuleFileNameA
Sleep
InterlockedIncrement
MoveFileA
WriteFile
DebugBreak
SetFileTime
SetFilePointer
ReadFile
CreateFileA
GetFileTime
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
InterlockedDecrement
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
CompareStringA
GetEnvironmentVariableA
GetModuleHandleA
GetProcAddress
SetUnhandledExceptionFilter
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
TlsAlloc
ExitProcess
GetVersion
GetCommandLineA
ExitThread
TlsGetValue
TlsSetValue
CreateThread
HeapReAlloc
RaiseException
RtlUnwind
SetEndOfFile
user32
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
DestroyCursor
SystemParametersInfoA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
LoadCursorA
wsprintfA
LoadStringA
mouse_event
BlockInput
CharNextA
SetCursorPos
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
ExitWindowsEx
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
gdi32
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
advapi32
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
shell32
SHGetFileInfoA
ws2_32
closesocket
gethostname
getsockname
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
ntohs
recv
send
select
gethostbyaddr
inet_addr
ioctlsocket
shutdown
__WSAFDIsSet
WSAGetLastError
Sections
.text Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ