Static task
static1
Behavioral task
behavioral1
Sample
ffa39789b0601e54903bad62561f69fc1fe4dd73a173f2df0639c0731771b5a6N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ffa39789b0601e54903bad62561f69fc1fe4dd73a173f2df0639c0731771b5a6N.exe
Resource
win10v2004-20241007-en
General
-
Target
ffa39789b0601e54903bad62561f69fc1fe4dd73a173f2df0639c0731771b5a6N
-
Size
329KB
-
MD5
266ce946779ad5d66ddb3cf464350a30
-
SHA1
d7908ce06e46e87a0a142550212ba3c31a9cc9d1
-
SHA256
ffa39789b0601e54903bad62561f69fc1fe4dd73a173f2df0639c0731771b5a6
-
SHA512
2525f209bc564c2455335d49d02bc702023a394a7f92aeb1a02556733e410173934da7726f3b460189da4f8b523af942dd58a988f1334bdd8e9596488147fb61
-
SSDEEP
6144:d7KKga7PgJeUI21kKFfAoQ4PUw5hPIy3Kz/bDdt59WpYX6TK:d2Tar9EAoDrjRKhLIe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ffa39789b0601e54903bad62561f69fc1fe4dd73a173f2df0639c0731771b5a6N
Files
-
ffa39789b0601e54903bad62561f69fc1fe4dd73a173f2df0639c0731771b5a6N.exe windows:4 windows x86 arch:x86
7673d58e9878a269c2fe3ec6172ec893
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
shell32
ShellExecuteW
ShellExecuteExW
kernel32
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageW
GetComputerNameW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryW
GetTickCount
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFree
LocalReAlloc
MultiByteToWideChar
OutputDebugStringA
DisableThreadLibraryCalls
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
WideCharToMultiByte
WriteFile
lstrcmpiW
lstrcpyW
lstrlenW
CloseHandle
CreateFileW
DeleteCriticalSection
OutputDebugStringW
user32
GetWindowLongW
InsertMenuItemW
LoadBitmapW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MessageBoxW
PostMessageW
RegisterClipboardFormatW
ReleaseDC
SendDlgItemMessageW
GetParent
SetCursor
SetDlgItemTextW
SetFocus
SetWindowLongW
SetWindowTextW
SystemParametersInfoW
WinHelpW
wsprintfW
EndDialog
EnableWindow
DialogBoxParamW
GetDlgItemTextA
GetDlgItem
SendMessageW
GetDC
comctl32
PropertySheetW
CreatePropertySheetPageW
crypt32
CertDuplicateCertificateContext
CertDuplicateStore
CertEnumCertificatesInStore
CertEnumSystemStore
CertFindCRLInStore
CertFreeCRLContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertGetEnhancedKeyUsage
CertGetNameStringW
CertOpenStore
CertSaveStore
CryptDecodeObject
CryptEncodeObject
CryptEnumOIDInfo
CryptFindOIDInfo
CryptQueryObject
CertDeleteCertificateFromStore
CertControlStore
CertCloseStore
CertAddCertificateContextToStore
gdi32
GetDeviceCaps
DeleteObject
CreateFontIndirectW
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ