Static task
static1
Behavioral task
behavioral1
Sample
69f171fc948a16409e3a491701a423944192c8788d691a927f1b8eabcc01bd43.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
69f171fc948a16409e3a491701a423944192c8788d691a927f1b8eabcc01bd43.exe
Resource
win10v2004-20240802-en
General
-
Target
69f171fc948a16409e3a491701a423944192c8788d691a927f1b8eabcc01bd43
-
Size
123KB
-
MD5
fa3d7109086d8eb7d156dc09ce20e59f
-
SHA1
fad94e5ab03a3fc81fbb69d6ffb01e5e47708732
-
SHA256
69f171fc948a16409e3a491701a423944192c8788d691a927f1b8eabcc01bd43
-
SHA512
8d3625320052744276570168432376100e0fbb78173b035e4a12bb64c977cf1140f10a655c0078097316825a06f394218c919483002d8b2e48e04ccc5b609420
-
SSDEEP
1536:R2bH+edtuuhEYqJ/8P+DLliuvVyBoSqy7Oq3xvyTYhotX+yZ:RjedtuKEYqJ9Dh/vVyJqy7Oq3xvyy6+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69f171fc948a16409e3a491701a423944192c8788d691a927f1b8eabcc01bd43
Files
-
69f171fc948a16409e3a491701a423944192c8788d691a927f1b8eabcc01bd43.exe windows:5 windows x86 arch:x86
b777c50a331abcf120e18f83b50f920f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegEnumValueW
RegOpenKeyExW
RegQueryInfoKeyW
comctl32
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControls
comdlg32
GetOpenFileNameW
kernel32
DeleteCriticalSection
EnterCriticalSection
FormatMessageW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesW
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LocalFree
QueryPerformanceCounter
SearchPathW
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wargv
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_wcmdln
abort
calloc
exit
free
fwrite
malloc
memmove
memset
signal
strncmp
vfprintf
_vsnwprintf
wcscmp
wcsrchr
shell32
DragAcceptFiles
DragFinish
DragQueryFileW
ShellAboutW
ShellExecuteW
winmm
mciGetErrorStringW
mciSendCommandW
user32
CharLowerBuffW
CheckMenuItem
CreateWindowExW
DefWindowProcW
DestroyAcceleratorTable
DispatchMessageW
EnableMenuItem
GetClientRect
GetMenu
GetMenuItemInfoW
GetMessageW
GetSubMenu
GetSystemMetrics
GetWindowRect
InsertMenuItemW
KillTimer
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MessageBoxW
MoveWindow
PostMessageW
PostQuitMessage
RegisterClassExW
SendMessageW
SetParent
SetProcessDefaultLayout
SetTimer
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UpdateWindow
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 35KB - Virtual size: 35KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ