Static task
static1
Behavioral task
behavioral1
Sample
cf2b8758dec69d650d88fea72b8ffcb34ade8f6b7f9b66401ce23a2160c53281N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf2b8758dec69d650d88fea72b8ffcb34ade8f6b7f9b66401ce23a2160c53281N.exe
Resource
win10v2004-20241007-en
General
-
Target
cf2b8758dec69d650d88fea72b8ffcb34ade8f6b7f9b66401ce23a2160c53281N
-
Size
612KB
-
MD5
d21f6b4bcb3c52061dd42d7830823940
-
SHA1
5474cd41a7eca331c1fce96cb0acacc5161a1dd7
-
SHA256
cf2b8758dec69d650d88fea72b8ffcb34ade8f6b7f9b66401ce23a2160c53281
-
SHA512
abac923025aa36a6cff948eafea91f048fe1441be98f4375ab8ab7583c6011c428d1c76209505ba30281c1271240d6e64b166c0070654c0d4de2355ea35b1968
-
SSDEEP
12288:+dXmAPpb7y6MeBG7QvsHdZ6MgQ5luq2G:ULy6Mek73TllLF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource cf2b8758dec69d650d88fea72b8ffcb34ade8f6b7f9b66401ce23a2160c53281N
Files
-
cf2b8758dec69d650d88fea72b8ffcb34ade8f6b7f9b66401ce23a2160c53281N.exe windows:5 windows x86 arch:x86
3710ccd9d63f4da0b2ab65385547feb9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMenuState
ScrollDC
GetUserObjectInformationA
AnyPopup
CharNextA
CharNextExA
ShowWindow
GetDesktopWindow
PostQuitMessage
IsDlgButtonChecked
DrawMenuBar
SetWindowTextA
IsCharAlphaNumericW
GetScrollPos
GetWindowTextLengthW
GetAsyncKeyState
CopyAcceleratorTableW
ExcludeUpdateRgn
CopyImage
GetParent
GetThreadDesktop
shell32
SHGetMalloc
ole32
GetHGlobalFromILockBytes
advapi32
CryptAcquireContextA
SetFileSecurityW
RegDeleteValueA
version
VerQueryValueW
netapi32
NetEnumerateComputerNames
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
GetLocaleInfoA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LoadLibraryA
LCMapStringA
HeapReAlloc
RtlUnwind
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
GetCurrentThread
GetModuleFileNameW
OpenProcess
GetCurrentProcessId
WTSGetActiveConsoleSessionId
SetStdHandle
SetLastError
WaitForDebugEvent
FileTimeToDosDateTime
SetEndOfFile
InitializeCriticalSection
LocalLock
LocalFree
CreateDirectoryA
lstrcatW
OpenSemaphoreW
QueryPerformanceFrequency
HeapAlloc
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapCreate
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
TerminateProcess
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ