Static task
static1
Behavioral task
behavioral1
Sample
dfc9a3b05ed464a428fcaf467cc3fa74.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfc9a3b05ed464a428fcaf467cc3fa74.exe
Resource
win10v2004-20231215-en
General
-
Target
dfc9a3b05ed464a428fcaf467cc3fa74
-
Size
456KB
-
MD5
dfc9a3b05ed464a428fcaf467cc3fa74
-
SHA1
f6c13bda34c762e4cf41238dccff55b246a178df
-
SHA256
335a1c54aaf09fb998add22df3c4bfca47ead250e659f5eb70a680b26ef05b9e
-
SHA512
b7eb9a26cf8f0d727df80fd7ad964e435743cb1cda70eff5926a09574fd7deb8b1db3f30f6153fcabc353e30f2f44ec87391757aa24aaea01d27ee1059d005bb
-
SSDEEP
6144:6jmY/c8hqHqqxupxK0T6wLegHDWVLiRR8+aiVOuurAaFqB0zSRG9C7S0:6Bc8h7DxTT6wLekDWDrAaI++RG9cS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dfc9a3b05ed464a428fcaf467cc3fa74
Files
-
dfc9a3b05ed464a428fcaf467cc3fa74.exe windows:4 windows x86 arch:x86
2f5390422ea2730b808dc0be26243119
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockFile
SetFilePointer
CreateFileA
OpenSemaphoreA
ResumeThread
GetProcAddress
GetModuleHandleA
GetLastError
CreateEventA
HeapSize
VirtualProtect
FlushFileBuffers
ReadFile
GetLocalTime
VirtualQuery
RtlUnwind
GetLocaleInfoA
WriteFile
CloseHandle
UnlockFile
IsBadCodePtr
GetSystemInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
user32
InSendMessage
GetWindow
GetClientRect
RegisterClassA
DrawTextA
GetLastActivePopup
GetSysColorBrush
EnumChildWindows
wsprintfA
IsWindowVisible
gdi32
FloodFill
SelectObject
advapi32
GetSidSubAuthorityCount
psapi
GetWsChanges
msvfw32
ICOpen
DrawDibGetBuffer
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 152KB - Virtual size: 652KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ