Static task
static1
Behavioral task
behavioral1
Sample
9681333def0df31418a194102d03c73e304d4276bca9398e7fd6c54b347e0d95.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9681333def0df31418a194102d03c73e304d4276bca9398e7fd6c54b347e0d95.exe
Resource
win10v2004-20240426-en
General
-
Target
9681333def0df31418a194102d03c73e304d4276bca9398e7fd6c54b347e0d95
-
Size
35KB
-
MD5
792fa7deb16d920557aae8be16a94f33
-
SHA1
cab073907433739e4fb9188c452f9af2c4ec5c1c
-
SHA256
9681333def0df31418a194102d03c73e304d4276bca9398e7fd6c54b347e0d95
-
SHA512
864f7768f6fc8089e67182207b8ea56dab694f5ed03fe29f149aa9c08b17f93613d591e1205bcb6a190424335283e48e879da930d94deb30a61afcacc7ab14de
-
SSDEEP
768:qfRygBbJj0dRwzgvysfjEe4VmGTNptikR:qZTBFoRpqEEpVTNH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9681333def0df31418a194102d03c73e304d4276bca9398e7fd6c54b347e0d95
Files
-
9681333def0df31418a194102d03c73e304d4276bca9398e7fd6c54b347e0d95.exe windows:5 windows x86 arch:x86
0c04f28339acdd43cd6fb9855519e957
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetBkMode
SetBrushOrgEx
SetMapMode
SetMetaFileBitsEx
SetPixel
SetPolyFillMode
SetROP2
SetStretchBltMode
SetTextAlign
SetTextColor
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
SetWinMetaFileBits
StartDocW
StartPage
StretchBlt
StretchDIBits
kernel32
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenEventA
OpenFileMappingA
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
PulseEvent
QueryPerformanceCounter
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
ExitProcess
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindResourceW
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeConsole
GetACP
GetDiskFreeSpaceA
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetExitCodeProcess
GetExitCodeThread
GetFullPathNameW
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcessHeap
GetProfileStringW
GetQueuedCompletionStatus
GetShortPathNameW
GetStartupInfoA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathA
GetTempPathW
GetUserDefaultLCID
GetVersion
GetVersionExA
GetVersionExW
GetVersionExW
HeapAlloc
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
IsDBCSLeadByteEx
IsValidCodePage
IsValidLocale
pdh
PdhValidatePathA
user32
CreateAcceleratorTableW
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DdeClientTransaction
DdeConnect
DdeCreateDataHandle
DdeCreateStringHandleW
DdeDisconnect
GetMessageA
LoadIconA
RegisterClassA
Sections
.text Size: 512B - Virtual size: 35B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ