Static task
static1
Behavioral task
behavioral1
Sample
9f5f73f994e0d0be8a3cd911158d8ed0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9f5f73f994e0d0be8a3cd911158d8ed0N.exe
Resource
win10v2004-20240709-en
General
-
Target
9f5f73f994e0d0be8a3cd911158d8ed0N.exe
-
Size
433KB
-
MD5
9f5f73f994e0d0be8a3cd911158d8ed0
-
SHA1
a1bc81cf1c005a875985688880f76653043df759
-
SHA256
c3c79c3a2a1caf1810d810d7976098e095ed08b9ff8ded3cdc402815452d3e67
-
SHA512
bb8985a2f5d938e610d7576bfe7c071b8f6c39e36579e7411723913ad2b6649147d8ad235c096340e6a2fea113bfdf18e40117eded5b7162ecc351c94a136932
-
SSDEEP
6144:m8NrU+Fr0lPrGm183dOnXWVTVwx+9Qga4v8joKQR/XH5CCJuumz4IraF:PrMqmoInSfqgae8joKQRPH5NZmz4Ira
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9f5f73f994e0d0be8a3cd911158d8ed0N.exe
Files
-
9f5f73f994e0d0be8a3cd911158d8ed0N.exe.exe windows:4 windows x86 arch:x86
52b0ab46f5dfc02951d86f0a34acbc94
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
PolyTextOutW
FixBrushOrgEx
SetDIBColorTable
PatBlt
StrokeAndFillPath
CreateBrushIndirect
GetKerningPairsW
comdlg32
PageSetupDlgA
ChooseColorW
PrintDlgA
ChooseFontW
ChooseColorA
FindTextW
ReplaceTextW
PageSetupDlgW
GetOpenFileNameW
GetSaveFileNameA
FindTextA
PrintDlgW
ReplaceTextA
GetFileTitleW
GetFileTitleA
LoadAlterBitmap
GetOpenFileNameA
shell32
SHGetPathFromIDListW
DragQueryFileW
ExtractIconA
RealShellExecuteExA
DoEnvironmentSubstA
SHInvokePrinterCommandA
SHEmptyRecycleBinA
DragQueryFile
SHGetDataFromIDListA
FindExecutableW
FreeIconList
SHGetSpecialFolderLocation
SHBrowseForFolderW
DragFinish
SHGetSpecialFolderPathA
SHInvokePrinterCommandW
RealShellExecuteA
SHAddToRecentDocs
FindExecutableA
SHFileOperationA
advapi32
RegConnectRegistryA
CreateServiceW
RegDeleteValueA
CryptCreateHash
RegFlushKey
kernel32
WriteConsoleOutputCharacterA
DeleteCriticalSection
SetLastError
GetOEMCP
InterlockedExchange
SetConsoleCtrlHandler
GetProfileIntW
GetCurrentProcess
GetTimeZoneInformation
LoadLibraryA
SetUnhandledExceptionFilter
GetProcAddress
TlsSetValue
UnlockFileEx
GetLocaleInfoA
SetPriorityClass
GetThreadLocale
HeapSize
GetCurrentThread
LeaveCriticalSection
GetCommandLineA
InterlockedIncrement
GetCPInfo
GetPriorityClass
GetModuleFileNameA
IsDebuggerPresent
GetLocaleInfoW
GetACP
FlushFileBuffers
GetProcessHeap
FillConsoleOutputCharacterA
FormatMessageW
GetSystemTimeAdjustment
SetConsoleCP
GetUserDefaultLCID
lstrcpyW
HeapReAlloc
VirtualQuery
LockFileEx
LocalFileTimeToFileTime
HeapCreate
CreatePipe
TerminateProcess
GetDateFormatA
FreeEnvironmentStringsW
WriteFile
DeleteFileW
GetTempPathA
TlsGetValue
SetThreadPriority
EnterCriticalSection
GetEnvironmentStrings
IsValidLocale
Sleep
CompareStringW
EnumDateFormatsExW
QueryPerformanceCounter
GetLastError
EnumSystemLocalesA
TlsAlloc
FreeLibrary
GetDriveTypeW
GetCurrentThreadId
WideCharToMultiByte
VirtualFree
GetTimeFormatA
HeapDestroy
LCMapStringW
GetStringTypeA
LCMapStringA
LoadLibraryExW
EnumSystemLocalesW
GetTickCount
SetEnvironmentVariableA
VirtualAlloc
InterlockedDecrement
SetHandleCount
FreeEnvironmentStringsA
GetCurrentProcessId
GetFileType
InitializeCriticalSection
ExitProcess
IsValidCodePage
GetModuleHandleA
GetStringTypeW
HeapFree
RtlUnwind
GetStdHandle
GetStartupInfoA
GetEnvironmentStringsW
GetVersionExA
CompareStringA
UnhandledExceptionFilter
TlsFree
GetSystemTimeAsFileTime
MultiByteToWideChar
HeapAlloc
user32
IsCharLowerA
RedrawWindow
EditWndProc
CreatePopupMenu
GetMenuInfo
DestroyCursor
ModifyMenuA
RegisterDeviceNotificationW
CharToOemW
DestroyIcon
DragDetect
SetMenuInfo
DrawIcon
SetScrollRange
LoadCursorA
SetCursorPos
Sections
.text Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 276KB - Virtual size: 275KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ