Static task
static1
Behavioral task
behavioral1
Sample
9fa37d67c858aae9feada4d4cf8bee80a2d7b2eb4a073a341fafe4f634c5d99c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9fa37d67c858aae9feada4d4cf8bee80a2d7b2eb4a073a341fafe4f634c5d99c.exe
Resource
win10v2004-20240802-en
General
-
Target
9fa37d67c858aae9feada4d4cf8bee80a2d7b2eb4a073a341fafe4f634c5d99c
-
Size
172KB
-
MD5
503b00953d8c0941cf7da08b854e7c9b
-
SHA1
ea7b680dc6d68318f9e324260a63f09caf9495d2
-
SHA256
9fa37d67c858aae9feada4d4cf8bee80a2d7b2eb4a073a341fafe4f634c5d99c
-
SHA512
e98f5d3ae2ffee90c22eec7dabf7b7c0338f8d111c5438166520fc150f7bf1b30debdc26374b5126b7b482c4befdd48eec57437c469f4ca8372dc5b1f1bc171f
-
SSDEEP
3072:ZxkMBgdHpFbHqQeKER66g7IS3YBTygzKoQ7hV9oOw:ZxBBgdHbH76+MbTyiQ1VyL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9fa37d67c858aae9feada4d4cf8bee80a2d7b2eb4a073a341fafe4f634c5d99c
Files
-
9fa37d67c858aae9feada4d4cf8bee80a2d7b2eb4a073a341fafe4f634c5d99c.exe windows:5 windows x86 arch:x86
609d9c126c90aeeb1078596483a68811
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
RegSetValueExW
comctl32
InitCommonControlsEx
getuname
GetUName
kernel32
DeleteCriticalSection
EnterCriticalSection
FreeLibrary
GetCPInfoExW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
MultiByteToWideChar
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
lstrcpynW
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_wcmdln
abort
calloc
exit
free
fwrite
malloc
memmove
memset
signal
strncmp
vfprintf
wcschr
wcscpy
wcsncpy
gdi32
CreateFontIndirectW
CreatePen
DeleteObject
EnumFontFamiliesExW
GetDeviceCaps
GetGlyphIndicesW
GetObjectW
GetStockObject
GetTextMetricsW
Rectangle
SelectObject
user32
AppendMenuW
BeginPaint
CreateDialogParamW
CreateWindowExW
DefWindowProcW
DestroyIcon
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawFocusRect
DrawTextW
EnableWindow
EndDialog
EndPaint
FillRect
GetClientRect
GetDC
GetDlgItem
GetFocus
GetKeyState
GetMessageW
GetParent
GetSystemMenu
GetSystemMetrics
GetUpdateRect
GetWindowLongW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
InflateRect
IntersectRect
InvalidateRect
IsDialogMessageW
IsWindow
LoadCursorW
LoadImageW
LoadStringW
MapWindowPoints
MoveWindow
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterClassW
ReleaseDC
ScrollWindowEx
SendDlgItemMessageW
SendMessageW
SetFocus
SetProcessDefaultLayout
SetScrollPos
SetScrollRange
SetWindowLongW
SetWindowTextW
ShowWindow
TranslateMessage
UnregisterClassW
UpdateWindow
wsprintfW
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 36KB - Virtual size: 36KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ