Static task
static1
Behavioral task
behavioral1
Sample
f369c900ea1a38d3f152a3a93db274ce3943b0b3daae9fd0b243d71a758208c1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f369c900ea1a38d3f152a3a93db274ce3943b0b3daae9fd0b243d71a758208c1.exe
Resource
win10v2004-20230915-en
General
-
Target
f369c900ea1a38d3f152a3a93db274ce3943b0b3daae9fd0b243d71a758208c1
-
Size
9.1MB
-
MD5
f508612ca6502c6c47b2e774db8d6613
-
SHA1
d2940f0684bab2827155d6f71e6eb118ef6187a8
-
SHA256
f369c900ea1a38d3f152a3a93db274ce3943b0b3daae9fd0b243d71a758208c1
-
SHA512
9ba37b4e9bc149e5b68f0dc501a4496a28c7ead209ccad316a14532bacdd69db3b4b4b1531d89aa8a99ffccf159af361c84ad4ba5cd5f4a03ef1786fd659efe6
-
SSDEEP
196608:0Mfesav7V1GuCwTdPa/LwpVP8nlYIFqORMyRoIn6hHYZS7p0fju:+RTV1WwTQigDQfyGInQHn7ufj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f369c900ea1a38d3f152a3a93db274ce3943b0b3daae9fd0b243d71a758208c1
Files
-
f369c900ea1a38d3f152a3a93db274ce3943b0b3daae9fd0b243d71a758208c1.exe windows:4 windows x86
667de3a0b2c4f71884e9fcb7150f570c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
GetTempPathA
MultiByteToWideChar
GetCommandLineA
CreateProcessA
GetCurrentDirectoryA
GetModuleFileNameA
MulDiv
SetCurrentDirectoryA
GetSystemDirectoryA
lstrlenA
WriteFile
GetEnvironmentStrings
LoadLibraryA
GetProcAddress
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
LockResource
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LCMapStringW
LCMapStringA
WideCharToMultiByte
HeapAlloc
CloseHandle
HeapFree
ExitProcess
lstrcpyA
WaitForSingleObject
GetVersion
GetStartupInfoA
GetModuleHandleA
RtlUnwind
SizeofResource
CreateFileA
FindResourceA
LoadResource
user32
GetKeyboardLayoutList
GetMessageA
LoadIconA
SetWindowLongA
PostMessageA
BringWindowToTop
DialogBoxParamA
DestroyIcon
EndPaint
GetDC
ReleaseDC
ShowWindow
CreateDialogParamA
CreateIconFromResource
BeginPaint
CallWindowProcA
LoadStringA
UnloadKeyboardLayout
DispatchMessageA
TranslateMessage
IsDialogMessageA
GetSysColor
GetWindowLongA
DrawIcon
MessageBoxA
DialogBoxIndirectParamA
UpdateWindow
SendMessageA
GetClientRect
LoadBitmapA
GetCursorPos
ScreenToClient
InflateRect
DrawFocusRect
GetDlgItem
SetWindowPos
FillRect
GetSystemMetrics
SetWindowTextA
EndDialog
DestroyWindow
CreateDialogIndirectParamA
gdi32
SetBkMode
GetDeviceCaps
DeleteObject
TextOutA
SetTextColor
SelectObject
CreateFontA
CreateSolidBrush
DeleteDC
BitBlt
CreateCompatibleDC
GetObjectA
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
CoInitialize
CoCreateInstance
imm32
ImmGetIMEFileNameA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9.0MB - Virtual size: 9.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ