Static task
static1
Behavioral task
behavioral1
Sample
df138c96b45614d5224eb00d3051ac7078fa12cf3e26dd86d9469f687c133dd9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df138c96b45614d5224eb00d3051ac7078fa12cf3e26dd86d9469f687c133dd9.exe
Resource
win10v2004-20241007-en
General
-
Target
df138c96b45614d5224eb00d3051ac7078fa12cf3e26dd86d9469f687c133dd9.exe
-
Size
175KB
-
MD5
df1e348372d344568c4505dca7846e77
-
SHA1
e0b4f55bb7fb8c0948b86511ce48ffdaac06bf71
-
SHA256
df138c96b45614d5224eb00d3051ac7078fa12cf3e26dd86d9469f687c133dd9
-
SHA512
bd924bbce90f1a2d4588960121ca1b74a7616d291ded5b8cf1a28e8a7c93358b3b9dc552c79b89d85bf76ebcb1200d91028bafacfce65058fd921f3e3b80d077
-
SSDEEP
3072:ayPqTcNkM2jt3MuZOjr6GtDp5BSzFOrPJxFc60cRAp:aTcNkTt5OfZpv8QcBkAp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df138c96b45614d5224eb00d3051ac7078fa12cf3e26dd86d9469f687c133dd9.exe
Files
-
df138c96b45614d5224eb00d3051ac7078fa12cf3e26dd86d9469f687c133dd9.exe.exe windows:6 windows x86 arch:x86
870fd781a201608756e20d4a156a48da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetConsoleWindow
SetConsoleCursorPosition
AllocConsole
GetLogicalDrives
FindFirstFileW
GetFileSizeEx
FindFirstVolumeW
FindNextFileW
GetFinalPathNameByHandleW
WaitForMultipleObjects
SetThreadPriority
GetQueuedCompletionStatus
lstrlenA
FindClose
PostQueuedCompletionStatus
SetFileAttributesW
GetCurrentThread
GetSystemInfo
LoadLibraryW
CreateThread
ExitProcess
GetStdHandle
LocalFree
MoveFileExW
FindVolumeClose
GetCurrentProcessId
SetThreadExecutionState
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
CreateIoCompletionPort
GetDriveTypeW
HeapCreate
HeapFree
HeapSize
HeapAlloc
GetProcessHeap
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
LCMapStringW
CompareStringW
GetProcAddress
WriteConsoleW
ScrollConsoleScreenBufferW
GetNativeSystemInfo
GetLastError
Sleep
OpenProcess
ReleaseMutex
WaitForSingleObject
CreateMutexW
SetProcessShutdownParameters
SetVolumeMountPointW
TerminateProcess
GetCurrentProcess
GetCommandLineW
SetPriorityClass
GetConsoleScreenBufferInfo
ReadFile
DeleteCriticalSection
GetLocalTime
CloseHandle
lstrcatW
CreateFileW
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
GetModuleFileNameW
WriteFile
EnterCriticalSection
lstrcmpiW
lstrcpyW
lstrlenW
SetFilePointerEx
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileType
GetCommandLineA
GetModuleHandleExW
RaiseException
EncodePointer
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwind
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
DecodePointer
user32
ShowWindow
wsprintfA
wsprintfW
advapi32
AllocateAndInitializeSid
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
shell32
SHGetFolderPathW
SHEmptyRecycleBinW
ShellExecuteW
CommandLineToArgvW
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitialize
CoUninitialize
oleaut32
VariantClear
SysAllocString
VariantInit
rstrtmgr
RmGetList
RmRegisterResources
RmStartSession
RmEndSession
shlwapi
PathRemoveFileSpecW
StrStrIW
PathFindExtensionW
Sections
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ