Static task
static1
Behavioral task
behavioral1
Sample
430a8fe89823f6cc3e3dbc1996da444b7f33fff738318773f72c2e5758d6da59.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
430a8fe89823f6cc3e3dbc1996da444b7f33fff738318773f72c2e5758d6da59.exe
Resource
win10v2004-20230915-en
General
-
Target
430a8fe89823f6cc3e3dbc1996da444b7f33fff738318773f72c2e5758d6da59
-
Size
7.5MB
-
MD5
fd80e4573010f61f00f859419f5c76bf
-
SHA1
439f51e0be380c01acd60c653eedceb258335a04
-
SHA256
430a8fe89823f6cc3e3dbc1996da444b7f33fff738318773f72c2e5758d6da59
-
SHA512
8f642aff80e7b2ec1ea99813ce0d6f14845a3fa9fb838c68a72f65704e797929821f25c75767f48bedbc12fab994870968a0da7228eeccac3ec14b997c686877
-
SSDEEP
196608:Sfz6WLJeTk2zZelC2GcuoyxGPvM0Ghe3WUTKcTW:CtLjUZkC25yiM0GQGcx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 430a8fe89823f6cc3e3dbc1996da444b7f33fff738318773f72c2e5758d6da59
Files
-
430a8fe89823f6cc3e3dbc1996da444b7f33fff738318773f72c2e5758d6da59.exe windows:5 windows x86
239b2b2624f9dff16b5a0066003dc54b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
RedrawWindow
gdi32
GetClipRgn
msimg32
AlphaBlend
comdlg32
GetFileTitleA
winspool.drv
GetJobA
advapi32
RegEnumKeyExA
shell32
SHAppBarMessage
comctl32
InitCommonControlsEx
shlwapi
PathRemoveExtensionA
ole32
OleFlushClipboard
oleaut32
OleCreateFontIndirect
oledlg
ord8
winmm
PlaySoundA
gdiplus
GdipGetImageGraphicsContext
oleacc
AccessibleObjectFromWindow
imm32
ImmReleaseContext
Sections
.text Size: 7.5MB - Virtual size: 9.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE