Static task
static1
Behavioral task
behavioral1
Sample
00f1ef1296db211624915be11a8edcfd8c95e590fb7e5efeb9cb1a85aeed88d9N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
00f1ef1296db211624915be11a8edcfd8c95e590fb7e5efeb9cb1a85aeed88d9N.exe
Resource
win10v2004-20241007-en
General
-
Target
00f1ef1296db211624915be11a8edcfd8c95e590fb7e5efeb9cb1a85aeed88d9N.exe
-
Size
495KB
-
MD5
2206b066bafcede0158d0f8af03e1870
-
SHA1
07b59c81dfa868589164c48dbf453d4e6ddf7cbc
-
SHA256
00f1ef1296db211624915be11a8edcfd8c95e590fb7e5efeb9cb1a85aeed88d9
-
SHA512
5a2d56ad228a7236cbc4eed277bf776341b85066edd125b7c80b6819964c765a41354b4aaf49628392edb02744ecd7ab3b44cace16e373a95d7164a3fa4de5b4
-
SSDEEP
12288:2VYT8EAmbt0A7Y85j9z54lIZwbyjDQxj2xlNU/CqoMip:2VQymh0kYJEGCDGMMfoHp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 00f1ef1296db211624915be11a8edcfd8c95e590fb7e5efeb9cb1a85aeed88d9N.exe
Files
-
00f1ef1296db211624915be11a8edcfd8c95e590fb7e5efeb9cb1a85aeed88d9N.exe.exe windows:5 windows x86 arch:x86
52f2688274226e8e29c159bfb480bb47
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleExA
SetLocalTime
BuildCommDCBAndTimeoutsA
SetUnhandledExceptionFilter
WaitNamedPipeA
GlobalSize
GetEnvironmentStringsW
GetUserDefaultLCID
InterlockedCompareExchange
WriteConsoleInputA
SetEvent
CreateDirectoryExA
CallNamedPipeW
GetModuleHandleW
CreateRemoteThread
GetDateFormatA
WriteFile
FindActCtxSectionStringA
GetDriveTypeA
AllocateUserPhysicalPages
GlobalAlloc
GetSystemDirectoryW
ReadFileScatter
GetVersionExW
DnsHostnameToComputerNameW
FindNextVolumeW
GetConsoleAliasW
GetFileAttributesW
GetModuleFileNameW
EnumCalendarInfoA
FindNextVolumeMountPointW
EnumSystemLocalesA
GetConsoleOutputCP
OpenMutexW
SetLastError
GetProcAddress
GetComputerNameExW
LoadLibraryA
LocalAlloc
SetCalendarInfoW
RemoveDirectoryW
GlobalGetAtomNameW
GetCommMask
RtlCaptureStackBackTrace
GlobalFindAtomW
EnumResourceTypesW
FindNextFileA
GetModuleHandleA
EraseTape
CreateMutexA
GetStringTypeW
RequestWakeupLatency
ScrollConsoleScreenBufferA
GetVolumeNameForVolumeMountPointW
DeleteFileW
GetFileInformationByHandle
CloseHandle
HeapSize
MultiByteToWideChar
lstrcmpA
GetLastError
DeleteFileA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetCurrentThreadId
GetCurrentThread
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
SetFilePointer
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
FatalAppExitA
Sleep
GetLocaleInfoW
GetLocaleInfoA
IsValidLocale
RtlUnwind
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
IsProcessorFeaturePresent
WriteConsoleW
CreateFileW
user32
GetMenu
advapi32
ReportEventA
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 323KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ