Static task
static1
Behavioral task
behavioral1
Sample
09df23ae37bb1c4c3656f1602a549f3d027dabe3e6a4e25493ece1a290cdea77.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09df23ae37bb1c4c3656f1602a549f3d027dabe3e6a4e25493ece1a290cdea77.exe
Resource
win10v2004-20240226-en
General
-
Target
09df23ae37bb1c4c3656f1602a549f3d027dabe3e6a4e25493ece1a290cdea77
-
Size
50KB
-
MD5
3741447c7596c70f592b9646499fc7e9
-
SHA1
e8c72b0c988591c1eeb7eed043f7e6e39618739d
-
SHA256
09df23ae37bb1c4c3656f1602a549f3d027dabe3e6a4e25493ece1a290cdea77
-
SHA512
817fcf0f12a26827cdf5e76c95f59a7fb4caf9243776a7bc4e5f88f1cbd2344a6769abbaba0f52b3afaadc80223b9433d2c30e3683c8a8c141088bd9ee479364
-
SSDEEP
768:jApQT/TK+ex9NrWZXLFaCj3m8YukeFQBgAu9GkuvYUr:j4quv9rWZXUCj3m8BkwQYA9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09df23ae37bb1c4c3656f1602a549f3d027dabe3e6a4e25493ece1a290cdea77
Files
-
09df23ae37bb1c4c3656f1602a549f3d027dabe3e6a4e25493ece1a290cdea77.exe windows:5 windows x86 arch:x86
44da0db04844b8ad84714d28b1110c57
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
calloc
strchr
swprintf
free
malloc
wprintf
isprint
sprintf
_snwprintf
_vsnwprintf
wcsncpy
swscanf
_wtoi
wcscmp
_wgetcwd
_wcsicmp
tolower
realloc
_wtol
_wsplitpath
_wmakepath
_c_exit
_exit
_XcptFilter
_cexit
exit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
wcscat
isdigit
wcscpy
wcslen
advapi32
RegOpenKeyExA
RegQueryValueExA
IsTextUnicode
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegisterEventSourceW
ReportEventW
DeregisterEventSource
ReadEventLogW
OpenEventLogW
ClearEventLogW
CloseEventLog
GetUserNameW
kernel32
SetFilePointer
ReadFile
ReleaseSemaphore
WriteFile
GetModuleFileNameW
CreateDirectoryW
GetLastError
LocalFree
SetErrorMode
SetEvent
GetLocalTime
GetDateFormatW
OpenProcess
CreateFileW
WideCharToMultiByte
MultiByteToWideChar
CreateThread
DeleteFileW
GetFileAttributesW
LoadResource
FindResourceExW
ExpandEnvironmentStringsW
GetProcAddress
FreeLibrary
InterlockedCompareExchange
LoadLibraryA
GetModuleHandleA
CreateSemaphoreW
OpenSemaphoreW
TerminateThread
TerminateProcess
GetCommandLineW
DelayLoadFailureHook
GetModuleHandleW
FormatMessageW
ExitProcess
GetComputerNameW
GetVersion
GetSystemInfo
ProcessIdToSessionId
CloseHandle
WaitForSingleObject
Sleep
gdi32
SelectObject
GetTextMetricsW
GetTextExtentPointW
GetStockObject
user32
CallWindowProcW
GetCursorPos
ScreenToClient
ChildWindowFromPoint
GetDlgCtrlID
WinHelpW
IsDlgButtonChecked
SendDlgItemMessageW
SetDlgItemTextA
GetDlgItemTextW
GetSystemMenu
AppendMenuW
GetDC
ReleaseDC
LoadIconW
LoadCursorW
RegisterClassW
CreateDialogParamW
MessageBeep
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
DialogBoxParamW
GetDlgItem
ShowWindow
EnableWindow
DefDlgProcW
KillTimer
PostQuitMessage
DefWindowProcW
SetTimer
EndDialog
SetDlgItemTextW
MessageBoxW
EnumChildWindows
SetWindowLongW
GetWindowLongW
UpdateWindow
SendMessageW
PostMessageW
SetForegroundWindow
GetParent
SetFocus
dbgeng
DebugCreate
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ