Static task
static1
Behavioral task
behavioral1
Sample
9f0d349e57d4bfa2c8c17cbabde3df7ee811ca52918288fbc3f4bd10052b12ecN.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9f0d349e57d4bfa2c8c17cbabde3df7ee811ca52918288fbc3f4bd10052b12ecN.exe
Resource
win10v2004-20240802-en
General
-
Target
9f0d349e57d4bfa2c8c17cbabde3df7ee811ca52918288fbc3f4bd10052b12ecN
-
Size
690KB
-
MD5
d5168fa56597cb77291f154e2bb71290
-
SHA1
d7802371dc0bd2f393a08baf7be44b3eee5093b9
-
SHA256
9f0d349e57d4bfa2c8c17cbabde3df7ee811ca52918288fbc3f4bd10052b12ec
-
SHA512
0e0c5044abe92e569e89c57716973c5bc190e0d1018cfe6ee737b6bf44d57d8eb67bfbef05eb1c60013295bb345ca87c3fd776ace72d87918ade45dd63981d44
-
SSDEEP
12288:ypa9nNno8GFIJGMEohM74pYmCtFrOVUelPaBVvZ:+annoRFIJ2frOVUelPaBVvZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9f0d349e57d4bfa2c8c17cbabde3df7ee811ca52918288fbc3f4bd10052b12ecN
Files
-
9f0d349e57d4bfa2c8c17cbabde3df7ee811ca52918288fbc3f4bd10052b12ecN.exe windows:5 windows x86 arch:x86
3c4c9ea096bf46ab7b06e1902c7cee7a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDeviceCaps
GetMapMode
GetNearestPaletteIndex
GetCurrentObject
GetStretchBltMode
GetFontLanguageInfo
SetPixel
GetPolyFillMode
GetBkColor
user32
SetDlgItemTextA
GetWindowLongA
RemovePropA
EndPaint
BeginPaint
WindowFromDC
GetMenuCheckMarkDimensions
IsWindowEnabled
ShowWindow
CheckDlgButton
kernel32
FileTimeToSystemTime
DecodePointer
ReadConsoleW
ReadFile
SetEndOfFile
HeapReAlloc
HeapSize
WriteConsoleW
SetFilePointerEx
DeleteFileA
FindClose
IsDebuggerPresent
GetLastError
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
GetProcAddress
LoadResource
GlobalSize
GlobalHandle
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
TerminateProcess
RaiseException
GetModuleFileNameW
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ExitProcess
GetModuleHandleExW
GetTimeZoneInformation
GetDriveTypeW
GetFileType
CloseHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
CreateFileW
GetStdHandle
WriteFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetACP
HeapFree
HeapAlloc
GetCurrentThread
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStringTypeW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetFullPathNameW
GetFullPathNameA
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
OutputDebugStringA
OutputDebugStringW
WaitForSingleObjectEx
CreateThread
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetProcessHeap
SetConsoleCtrlHandler
advapi32
SystemFunction036
Sections
.text Size: 613KB - Virtual size: 612KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE