Static task
static1
Behavioral task
behavioral1
Sample
94c93fce63c6ec5c627debeb8ab50c4316a9f0ba1d3559a306d22776973a1eb3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
94c93fce63c6ec5c627debeb8ab50c4316a9f0ba1d3559a306d22776973a1eb3.exe
Resource
win10v2004-20241007-en
General
-
Target
94c93fce63c6ec5c627debeb8ab50c4316a9f0ba1d3559a306d22776973a1eb3
-
Size
172KB
-
MD5
4956fd1e59c03026278ec35d433eee42
-
SHA1
2d19b211ff6e261d8b4d8faff0c1365897ba5131
-
SHA256
94c93fce63c6ec5c627debeb8ab50c4316a9f0ba1d3559a306d22776973a1eb3
-
SHA512
4a090ee693f710101af3b5a57280f5fb84f50e78dd646ac193a26fc16236a26f590dbfa6d1eaec7110093e5c150c843cfcff1832c2e8c28766d06056ec499069
-
SSDEEP
3072:XES9GXFiVQ8awnYD53lXRRvVqbT1QnEx9CkUau61pLuNPuBQUvsDmxJOwVpj:XEB56nI513vgT1GExckUOpaGBNvQw4wb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 94c93fce63c6ec5c627debeb8ab50c4316a9f0ba1d3559a306d22776973a1eb3
Files
-
94c93fce63c6ec5c627debeb8ab50c4316a9f0ba1d3559a306d22776973a1eb3.exe windows:4 windows x86 arch:x86
e0dd96a9a614a392e9e52bd86369ed48
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegEnumKeyW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteKeyA
comdlg32
GetSaveFileNameW
gdi32
MoveToEx
GetTextMetricsW
CombineRgn
GetDeviceCaps
DeleteObject
CreateDIBSection
CreateSolidBrush
BitBlt
SetViewportExtEx
SetTextColor
CreateCompatibleBitmap
CreatePen
CreatePatternBrush
SetViewportOrgEx
LineTo
CreateCompatibleDC
ExtCreateRegion
SelectObject
GetCharWidthW
SetBkMode
GetObjectW
DeleteDC
CreateFontW
StretchBlt
CreateDCW
SetBkColor
GetStockObject
shell32
ShellExecuteW
msvfw32
ICInfo
comctl32
ImageList_Create
ImageList_Draw
ImageList_ReplaceIcon
ImageList_Destroy
kernel32
FindFirstFileW
WriteFile
GetVDMCurrentDirectories
ExitProcess
GetProcAddress
HeapAlloc
FreeLibrary
SetThreadPriorityBoost
GetCurrentProcessId
LoadLibraryW
GetUserDefaultUILanguage
EnumResourceNamesW
CreateProcessW
MultiByteToWideChar
GetLocalTime
SetFilePointer
FindClose
OutputDebugStringW
SetUnhandledExceptionFilter
DeleteFileW
GetModuleHandleA
ReadFile
CreateFileA
MoveFileW
WideCharToMultiByte
HeapFree
user32
GetDlgItem
GetWindowInfo
GetWindowLongW
EndDialog
GetWindowRect
SetWindowsHookExW
MessageBoxW
MoveWindow
AdjustWindowRect
SetWindowTextW
GetMenuStringW
GetSysColor
SetRect
SendMessageW
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imul Size: 1024B - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ