Static task
static1
Behavioral task
behavioral1
Sample
faa745e744e7c5176fe41121d6049c40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faa745e744e7c5176fe41121d6049c40N.exe
Resource
win10v2004-20240802-en
General
-
Target
faa745e744e7c5176fe41121d6049c40N
-
Size
203KB
-
MD5
faa745e744e7c5176fe41121d6049c40
-
SHA1
aa60e77f369afc6d31a8251589662ee68aabdd77
-
SHA256
1a81665bc96cd286c5d32b6634bbe4285cea25f3c7577c2897a24be234fed72b
-
SHA512
c0cb058dafe2706ac4c9531740977ea5a5c3f8fab4dc2e4d2501c18384ef3e4dfb48739885d58f80c47ae62351a73a4ff2a7f91cacfe95e577d7c03abd817752
-
SSDEEP
6144:lEL1lvsWYuOiMnGNuuF8XcfI2MPO7qhnhF9mD:cnksHxyXcfIRhFE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource faa745e744e7c5176fe41121d6049c40N
Files
-
faa745e744e7c5176fe41121d6049c40N.exe windows:4 windows x86 arch:x86
dec3dee9869bb0d71498fbbf0d597bb9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
MoveFileW
GetLogicalDrives
WinExec
SearchPathW
GetACP
GetModuleHandleA
CreateDirectoryW
CompareStringA
GetEnvironmentStringsA
lstrcmpA
ExpandEnvironmentStringsA
SuspendThread
lstrcmpi
GetHandleInformation
lstrcatA
GetStringTypeW
CreateSemaphoreA
GetProcAddress
EnumTimeFormatsA
GetSystemDefaultLCID
GetNamedPipeInfo
GetCurrentThreadId
GetNumberFormatA
IsBadStringPtrA
GetModuleFileNameA
user32
DrawTextW
GetMessageW
OffsetRect
DialogBoxParamA
SendMessageW
CreateDialogIndirectParamW
LoadBitmapA
SetForegroundWindow
GetDlgItem
MonitorFromPoint
FindWindowW
WaitForInputIdle
CreateWindowExA
MoveWindow
SetWindowTextA
CharUpperA
GetDC
UpdateWindow
UnregisterClassA
GetKeyboardType
ShowWindow
GetClassInfoW
RegisterClassExW
CharNextA
CreateWindowExW
IsDlgButtonChecked
mouse_event
PostMessageA
RegisterClassExA
SetCursorPos
GetMenuItemInfoA
wvsprintfA
CharUpperW
GetCursorPos
GetSystemMetrics
CreateDialogParamA
GetIconInfo
ArrangeIconicWindows
DefWindowProcW
GetClassNameW
GetClassInfoExA
gdi32
BitBlt
GetTextMetricsW
CreateMetaFileW
GetEnhMetaFileA
CreateMetaFileA
EnumFontFamiliesExA
ResizePalette
FlattenPath
CreateFontIndirectW
OffsetClipRgn
GetCharABCWidthsI
SetMapperFlags
RestoreDC
TranslateCharsetInfo
SetBrushOrgEx
GetEnhMetaFileDescriptionA
PtInRegion
advapi32
RegQueryValueW
RegSaveKeyW
RegOpenKeyW
RegRestoreKeyW
RegFlushKey
RegEnumValueA
RegOpenKeyExA
RegCreateKeyExA
RegEnumValueW
RegCreateKeyExW
shlwapi
PathParseIconLocationW
UrlGetLocationW
PathFileExistsW
AssocQueryStringA
UrlCreateFromPathW
PathUndecorateA
StrCmpNIA
PathIsFileSpecW
Sections
.qtJ Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tc Size: 3KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VXtI Size: 3KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.B Size: 4KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 103KB - Virtual size: 418KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.M Size: 4KB - Virtual size: 479KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ