Static task
static1
Behavioral task
behavioral1
Sample
f43d94993c286933988d5474093d1fcf6f60311b0c3b8a0c3cff20499d1e16e4N.exe
Resource
win7-20240903-en
General
-
Target
f43d94993c286933988d5474093d1fcf6f60311b0c3b8a0c3cff20499d1e16e4N.exe
-
Size
265KB
-
MD5
4e4b28563658f3c6470af216f13bca40
-
SHA1
3da6a9e888b1f5aa023d8066d2bec9c71633f677
-
SHA256
f43d94993c286933988d5474093d1fcf6f60311b0c3b8a0c3cff20499d1e16e4
-
SHA512
bd110e3c1b1d0e847c92ed871c6ef0715082f829452a120589fde160974574fe07a620e49a32d1b80962167df9d3e980f2fbae02ce9afad4e5d50cee91fe2084
-
SSDEEP
3072:0Y4UBFIq/C3gYvtYtJoVwdHKKNuvpduV8d4i/3pb5kueEe8cRXgM26bHgEZkvhrT:PHbtXujuDg3VqueEyEGHPk5d13Hrn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f43d94993c286933988d5474093d1fcf6f60311b0c3b8a0c3cff20499d1e16e4N.exe
Files
-
f43d94993c286933988d5474093d1fcf6f60311b0c3b8a0c3cff20499d1e16e4N.exe.exe windows:4 windows x86 arch:x86
da7c39c00b9df017acb8e1fedfbbf906
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GetProcessVersion
GetCPInfo
GetOEMCP
SetErrorMode
GetCurrentProcess
FlushFileBuffers
SetEndOfFile
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
RaiseException
HeapReAlloc
HeapSize
MultiByteToWideChar
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
WideCharToMultiByte
InterlockedIncrement
WritePrivateProfileStringA
GlobalFlags
MulDiv
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
InterlockedDecrement
LoadLibraryA
FreeLibrary
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
FindFirstFileA
SetFileAttributesA
FindNextFileA
FindClose
GetDriveTypeA
CreateDirectoryA
GetModuleHandleA
GetProcAddress
SetFilePointer
GetFileSize
ReadFile
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
SetThreadContext
ResumeThread
CreateFileA
lstrlenA
WriteFile
CloseHandle
GetModuleFileNameA
GetFileAttributesA
WinExec
Sleep
CreateMutexA
GetLastError
GetSystemDirectoryA
lstrcatA
lstrcpyA
CopyFileA
GetACP
MoveFileExA
user32
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
IsDialogMessageA
SetWindowTextA
ShowWindow
LoadCursorA
ClientToScreen
GetClassNameA
PtInRect
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetSysColorBrush
LoadStringA
DestroyMenu
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
EndDialog
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
EnableWindow
CharNextA
wsprintfA
SendMessageA
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
LoadIconA
SetActiveWindow
UnregisterClassA
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteObject
CreateBitmap
DeleteDC
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
comctl32
ord17
urlmon
URLDownloadToCacheFileA
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.adate Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 121KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adate Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE