Static task
static1
Behavioral task
behavioral1
Sample
9e43dd18a221a4da3bc9491af63e79b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9e43dd18a221a4da3bc9491af63e79b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
9e43dd18a221a4da3bc9491af63e79b0N
-
Size
6.8MB
-
MD5
9e43dd18a221a4da3bc9491af63e79b0
-
SHA1
d4f065d088f3419086515e402fa6ecc512924f3f
-
SHA256
985436087ae0f10db9f20effe3f3816c633acddaf55d44fbbb047410edf14a63
-
SHA512
ed8eaff96d25657dea120d52fcbb7eb51db138c20ff1cf1a41750f75e0921366a11f2c7e369673bbc5ea86e047525e164f63dd240e9102b8d6ad354ad0614867
-
SSDEEP
196608:X79lmG+zSGF8fRmaiXhnCt4MvJpKZYvgetzNiYg:JcxLFSZoot406Smd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9e43dd18a221a4da3bc9491af63e79b0N
Files
-
9e43dd18a221a4da3bc9491af63e79b0N.exe windows:6 windows x86 arch:x86
987e64998b677dc45bd8e32f862f3db2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringW
LoadLibraryExW
GetOEMCP
IsValidCodePage
SetFilePointerEx
ReadFile
GetConsoleCP
FlushFileBuffers
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCurrentProcessId
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
SetStdHandle
GetProcessHeap
HeapSize
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetProcAddress
TlsFree
TlsSetValue
TlsAlloc
TerminateProcess
SetLastError
WriteConsoleW
ReadConsoleW
CreateFileW
CloseHandle
CreateProcessW
GetCurrentProcess
GetLastError
GetCommandLineA
GetTickCount
GetModuleHandleW
GetEnvironmentStringsW
GetSystemDefaultLangID
Sleep
GetCommandLineW
LCMapStringW
GetThreadTimes
FreeEnvironmentStringsW
RtlUnwind
UnhandledExceptionFilter
EnterCriticalSection
GetStartupInfoW
GetACP
CompareStringW
GetEnvironmentVariableA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
FormatMessageA
GetCurrentThread
WaitForSingleObjectEx
GlobalLock
GetModuleHandleExW
QueryPerformanceCounter
TlsGetValue
GlobalMemoryStatus
HeapReAlloc
GetVersionExA
CreatePipe
CreateNamedPipeA
MulDiv
GlobalAlloc
SetCommState
GetCurrentThreadId
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
EncodePointer
DecodePointer
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
RaiseException
HeapFree
GetCPInfo
HeapAlloc
user32
ShowOwnedPopups
EndPaint
DestroyAcceleratorTable
GetSystemMenu
IsIconic
SetKeyboardState
SetCapture
DrawTextW
DeleteMenu
GetParent
GetClientRect
DrawEdge
ShowCaret
GetQueueStatus
LoadAcceleratorsW
InflateRect
CreateDialogIndirectParamA
GetWindowPlacement
GetScrollInfo
ScrollWindow
SetWindowsHookExA
SetMenu
DrawMenuBar
AppendMenuA
DispatchMessageA
ReleaseCapture
GetSystemMetrics
SetCaretPos
EnableWindow
EndMenu
GetDlgItemTextA
EndDeferWindowPos
UnregisterClassA
EnableScrollBar
CreateCaret
SystemParametersInfoA
DestroyMenu
SetDlgItemTextA
ValidateRect
GetDlgItem
gdi32
CreatePolygonRgn
EndPage
GetTextExtentPoint32A
SetTextColor
GetCharacterPlacementW
GetDeviceCaps
ExcludeClipRect
GdiFlush
CreateDCA
GetPaletteEntries
EnumFontFamiliesExA
CreatePenIndirect
CreateCompatibleDC
CombineRgn
Rectangle
GetCharWidth32W
GetBkColor
SelectPalette
SetPaletteEntries
EnumFontFamiliesA
GetNearestPaletteIndex
GetCharWidth32A
CreatePatternBrush
GetClipBox
GetTextMetricsA
CloseEnhMetaFile
CreateEnhMetaFileW
GetBrushOrgEx
EnumFontsA
GetBitmapBits
GetDIBits
GetCharWidthA
ExtTextOutW
GetDIBColorTable
Polyline
SetWinMetaFileBits
advapi32
GetUserNameA
SetSecurityDescriptorOwner
RegCreateKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
shell32
CommandLineToArgvW
Sections
.text Size: 612KB - Virtual size: 612KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.2MB - Virtual size: 6.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ