Static task
static1
Behavioral task
behavioral1
Sample
f5121b574648f600b6345c49c2e6fe1f699dd8b7e30f5f8941bab1e6bfb6b8d3.exe
Resource
win7-20240903-en
General
-
Target
f5121b574648f600b6345c49c2e6fe1f699dd8b7e30f5f8941bab1e6bfb6b8d3
-
Size
176KB
-
MD5
c9567bfe37a45f6807c0b8efa58708be
-
SHA1
3bbe0f649376f3b77593dc70a5ace0b3a31f289b
-
SHA256
f5121b574648f600b6345c49c2e6fe1f699dd8b7e30f5f8941bab1e6bfb6b8d3
-
SHA512
901c784cc7e81e4bca3782846b42b3543327983126fc025bd1ace833025da6f7ef8840b90c44cf4f42ec76490c0890194cf051c064c1bf7bcbf8ed3c80bc2cc6
-
SSDEEP
3072:W4dkMa8usOxTBI/j6/aBI8uiSiZjGqY1zY39KELBJ5LkbEW+d0c0irf:mcAu2CBI8uR0A0NKELB7kb9NUrf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5121b574648f600b6345c49c2e6fe1f699dd8b7e30f5f8941bab1e6bfb6b8d3
Files
-
f5121b574648f600b6345c49c2e6fe1f699dd8b7e30f5f8941bab1e6bfb6b8d3.exe windows:4 windows x86 arch:x86
235e4caf15754b2c090efe8bf5146912
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToLocalFileTime
SetEnvironmentVariableA
InitializeCriticalSection
HeapAlloc
GetStdHandle
GetUserDefaultLCID
GetVersionExA
VirtualFree
LoadLibraryA
FindClose
GetLocaleInfoA
IsValidLocale
LCMapStringW
lstrcpynA
GetLocalTime
GetFileAttributesA
FileTimeToSystemTime
GetDriveTypeA
GetSystemTime
GetStringTypeW
HeapFree
ReleaseMutex
GetLocaleInfoW
GetUserDefaultUILanguage
lstrlenA
GetModuleFileNameA
WaitForSingleObject
GetModuleHandleExW
SetConsoleMode
GetShortPathNameA
SetVolumeLabelA
LocalUnlock
CreateMutexA
GetCurrentProcess
SetConsoleCtrlHandler
ExitProcess
WideCharToMultiByte
GetFileTime
GetConsoleMode
GetFileType
SetHandleCount
IsValidCodePage
InterlockedExchange
GetEnvironmentVariableA
FindFirstFileA
CompareStringW
HeapDestroy
GetProcAddress
GetConsoleScreenBufferInfo
SetStdHandle
HeapCreate
LeaveCriticalSection
GetFullPathNameA
GetStringTypeA
VirtualAlloc
GetTimeZoneInformation
GetModuleHandleA
LCMapStringA
GetDriveTypeA
CompareStringA
GetStartupInfoA
SetThreadPriorityBoost
GetProcessHeap
GlobalFlags
CreateFileA
FindNextFileA
lstrcmpiA
FindVolumeClose
GetVolumeInformationA
EnumSystemLocalesA
shlwapi
SHDeleteValueA
PathFileExistsW
PathRemoveBackslashA
shell32
SHGetSpecialFolderPathW
ShellExecuteExA
ExtractIconExA
ole32
OleUninitialize
CoCreateInstance
OleInitialize
urlmon
CreateURLMoniker
user32
EnableWindow
GetParent
DrawTextA
CharPrevA
SystemParametersInfoA
DestroyWindow
LoadIconA
GetDlgItem
RegisterClassA
GetWindowTextA
PostQuitMessage
LoadBitmapA
EndDialog
CharNextA
GetDlgItemTextA
ScreenToClient
LoadCursorA
FillRect
SendDlgItemMessageA
SetRect
BeginPaint
IsWindowVisible
SetDlgItemTextA
CreateDialogParamA
GetWindowRect
SetWindowPos
EndPaint
SetClassLongA
GetDesktopWindow
GetClientRect
gdi32
IntersectClipRect
SelectObject
SetBkColor
CreatePen
OffsetClipRgn
GetClipRgn
GetNearestColor
SetTextColor
GetStockObject
CreateRectRgn
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE