Static task
static1
Behavioral task
behavioral1
Sample
MFA_migration_patchv3.5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
MFA_migration_patchv3.5.exe
Resource
win10v2004-20241007-en
General
-
Target
f9a4d4e605f23a0eb568eb131f43e9577f0722cf5683955f280e910722f7e185
-
Size
2.8MB
-
MD5
3acae01483799f67397311f890aa0f32
-
SHA1
d0053c358f60d348c896ed39d7b78496b1789260
-
SHA256
f9a4d4e605f23a0eb568eb131f43e9577f0722cf5683955f280e910722f7e185
-
SHA512
4a701d527f8dd8e062a94ecbc923d23824bde0b0f78b9397c8d8ea536e753650d998d9782f81ded028602a4e6e8d4023e643386f026d10ee658ea72115d3ed4e
-
SSDEEP
49152:KCC+OAqkLI5MbyRHqm0GPF/JARDEq+z8Td7IqiG7wtcb6m+0jaqV2dVGF5iF3mtr:KxhpqbcKWNJI9+z8OqiZtcb6T0DriYtr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/MFA_migration_patchv3.5.exe
Files
-
f9a4d4e605f23a0eb568eb131f43e9577f0722cf5683955f280e910722f7e185.zip
Password: infected
-
MFA_migration_patchv3.5.exe.exe windows:5 windows x86 arch:x86
acbc8f761f4e19d096f011fd86326533
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
kernel32
RemoveDirectoryA
TlsSetValue
GetVersionExA
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetModuleFileNameW
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetCommandLineW
GetStartupInfoW
GetTempPathA
GetLastError
LoadLibraryExA
Sleep
CreateDirectoryA
SetStdHandle
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
GetFileType
DecodePointer
EncodePointer
SetConsoleCtrlHandler
HeapFree
GetModuleHandleW
ExitProcess
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
HeapAlloc
DeleteFileA
FindNextFileA
GetCommandLineA
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwind
SetHandleCount
GetStdHandle
DeleteCriticalSection
TlsAlloc
TlsGetValue
SetEnvironmentVariableW
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
WideCharToMultiByte
LoadLibraryW
WriteFile
GetFullPathNameA
CloseHandle
GetFileInformationByHandle
PeekNamedPipe
CreateFileA
GetCurrentDirectoryW
GetFileAttributesA
MultiByteToWideChar
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CompareStringW
SetEnvironmentVariableA
HeapSize
GetDriveTypeW
SetEndOfFile
GetProcessHeap
GetTimeZoneInformation
LCMapStringW
WriteConsoleW
GetStringTypeW
CreateFileW
ws2_32
ntohl
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ