Static task
static1
Behavioral task
behavioral1
Sample
09fd0bf451c5807b56ee315e681ff12228e7dbac73b63ccb9f1a70ad2db59062.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
09fd0bf451c5807b56ee315e681ff12228e7dbac73b63ccb9f1a70ad2db59062.exe
Resource
win10v2004-20240226-en
General
-
Target
09fd0bf451c5807b56ee315e681ff12228e7dbac73b63ccb9f1a70ad2db59062
-
Size
161KB
-
MD5
bc5fbeb201e52a776761be60575420d3
-
SHA1
46c95c4d37a63d393c086e160100ee54bd0f1847
-
SHA256
09fd0bf451c5807b56ee315e681ff12228e7dbac73b63ccb9f1a70ad2db59062
-
SHA512
246972cf8f4ee673f50ed16883859a7fadaedf351aec5adaabd9d3da5779d9123c3687e33ae450fba2e27f19a7cf0a66d9ae364799a434a5597dfe62f56bdcfa
-
SSDEEP
3072:wKGrkCJj+pXHaS/cOJs0/r83WwuXdXcDpIPsJ:wKGap3ze0D83WVsZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09fd0bf451c5807b56ee315e681ff12228e7dbac73b63ccb9f1a70ad2db59062
Files
-
09fd0bf451c5807b56ee315e681ff12228e7dbac73b63ccb9f1a70ad2db59062.exe windows:1 windows x86 arch:x86
a11c2a003af7a01073d967b0f539304a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringA
user32
DefWindowProcW
DestroyWindow
DispatchMessageW
EnableWindow
GetCursorPos
GetMessageW
GetSystemMenu
GetWindowLongW
LoadStringW
MessageBoxW
PostMessageW
SendMessageW
SetWindowLongW
SetWindowTextW
TranslateMessage
wsprintfW
CreateWindowExW
kernel32
CloseHandle
CreateFileW
DeleteFileW
FormatMessageW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoW
GetStdHandle
GetSystemDirectoryW
GetTickCount
LoadLibraryA
LoadLibraryW
LocalFree
QueryPerformanceCounter
SetThreadUILanguage
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VirtualProtect
WideCharToMultiByte
lstrcmpW
lstrlenW
FreeLibrary
imm32
ImmGetContext
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
Sections
AUTO Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DGROUP Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.sys Size: 150B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE