Static task
static1
Behavioral task
behavioral1
Sample
ff9a6cdfc7acbec0d73efdc80fbbcfa20e6e9d19f06a9053bd5709e9bb6fe143.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ff9a6cdfc7acbec0d73efdc80fbbcfa20e6e9d19f06a9053bd5709e9bb6fe143.exe
Resource
win10v2004-20230915-en
General
-
Target
ff9a6cdfc7acbec0d73efdc80fbbcfa20e6e9d19f06a9053bd5709e9bb6fe143
-
Size
201KB
-
MD5
a180cc3e6e450872422faa7cbf5f3971
-
SHA1
d3a3cf3221f60a49c7366a5438c21bab92a5c501
-
SHA256
ff9a6cdfc7acbec0d73efdc80fbbcfa20e6e9d19f06a9053bd5709e9bb6fe143
-
SHA512
b1fd107d66965de5ae9c3bcb53fe2f1a578af2a316c2d21c87780bc4602c68d5c4a62d338f567b67582162e435f073461796c39724eac146cd6336cb085f57b4
-
SSDEEP
3072:icb9+h6MyD+AuVjMJMI/Xx/HWwxOXyVVNw:icu2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff9a6cdfc7acbec0d73efdc80fbbcfa20e6e9d19f06a9053bd5709e9bb6fe143
Files
-
ff9a6cdfc7acbec0d73efdc80fbbcfa20e6e9d19f06a9053bd5709e9bb6fe143.exe windows:5 windows x64
327800b881c4ddded1604e31772c82fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
LoadStringW
SendDlgItemMessageW
SendMessageW
SetWindowPos
wsprintfW
ShowWindow
SetWindowTextW
LoadImageW
LoadIconW
GetSystemMetrics
EndDialog
DialogBoxParamW
DestroyWindow
DestroyIcon
DefWindowProcW
CreateDialogParamW
BringWindowToTop
SetDlgItemInt
EnableWindow
GetDlgItem
advapi32
RegCloseKey
EnumServicesStatusExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
CloseServiceHandle
QueryServiceConfig2W
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
comctl32
InitCommonControlsEx
shell32
SHGetSpecialFolderPathW
shlwapi
PathAddBackslashW
msvcrt
__lconv_init
memset
wcscat
wcslen
wcscspn
fgetws
_wfopen
fclose
feof
wcscmp
wcscpy
swprintf
wcschr
_wcsnicmp
_wtoi
memcpy
malloc
__setusermatherr
_amsg_exit
__wgetmainargs
__set_app_type
exit
_cexit
_fpreset
_initterm
__winitenv
_wcmdln
signal
kernel32
GetStartupInfoW
LoadLibraryW
GetProcAddress
GetModuleHandleW
FreeLibrary
SetUnhandledExceptionFilter
CloseHandle
Sleep
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
DeleteCriticalSection
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
TlsGetValue
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
GetLongPathNameW
GetWindowsDirectoryW
CreateProcessW
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ