Static task
static1
Behavioral task
behavioral1
Sample
c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287eN.exe
Resource
win10v2004-20250207-en
General
-
Target
c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287eN.exe
-
Size
4.0MB
-
MD5
7e0e9d61b4719a57f69301984f2e29e0
-
SHA1
ad08f2cc627d9d1bddea42b99003a3ffcb20a1f7
-
SHA256
c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287e
-
SHA512
b7e6a8013fc863107f2b7b3be0fef863a435dc492e4ee3afa4820e1ffc262b947bed009f0ed3567c9eb06b213948a1211117db44142101f3a9d46152006c93a7
-
SSDEEP
98304:J8NPKZC3KHXThoNyx8bOpgSrU4d5SOAy1pHbMuJ:JoPKZC3KHXThoNyx8bOpgSTfX1dFJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287eN.exe
Files
-
c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287eN.exe.exe windows:5 windows x86 arch:x86
a704ddc8f1da99876774cdb3c9cd0f63
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
SetFilePointer
WriteConsoleW
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FlushFileBuffers
GetVolumeInformationW
LocalFree
CloseHandle
GetModuleHandleA
GetModuleFileNameA
LocalAlloc
CreateFileMappingA
LoadLibraryA
GetProcAddress
GetLastError
ReleaseSemaphore
MultiByteToWideChar
ReadFile
CreateSemaphoreA
Sleep
GetSystemDirectoryW
GlobalAlloc
SetCommState
WaitForSingleObject
GetCurrentProcess
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCommState
HeapAlloc
MapViewOfFile
CreateFileA
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetModuleHandleW
ExitProcess
WriteFile
user32
LoadCursorA
DefMDIChildProcA
DispatchMessageA
DefWindowProcA
CreateWindowExA
GetWindowLongA
MessageBoxW
UpdateWindow
EndPaint
DestroyWindow
GetMessageA
SetWindowRgn
SetTimer
CreateMDIWindowW
RegisterClassExA
KillTimer
LoadStringA
LoadIconA
wsprintfA
GetClientRect
SendMessageA
BeginPaint
DrawFocusRect
TranslateMessage
RegisterClassExW
OffsetRect
GetCursorInfo
GetWindowTextA
SetRect
SetWindowLongA
gdi32
GetStockObject
CreateEllipticRgn
MoveToEx
LPtoDP
CreatePolyPolygonRgn
CreateFontIndirectA
DeleteObject
CombineRgn
SetMapMode
CreateRoundRectRgn
GetObjectA
comdlg32
PrintDlgExA
PageSetupDlgA
advapi32
AllocateAndInitializeSid
GetSidSubAuthorityCount
GetSidIdentifierAuthority
OpenProcessToken
CheckTokenMembership
FreeSid
IsValidSid
GetTokenInformation
ConvertSidToStringSidA
shell32
SHBrowseForFolderA
ole32
CoCreateInstance
ws2_32
recv
inet_addr
closesocket
send
crypt32
PFXImportCertStore
PFXExportCertStore
iphlpapi
GetIpAddrTable
setupapi
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
wldap32
ord88
ord143
quartz
AMGetErrorTextW
Sections
.text Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 220KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ