Static task
static1
Behavioral task
behavioral1
Sample
f694c3d8271ef389f6a3db5bba04859a2bc2a6f4d4d9ac616133b2d1d4a277d0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f694c3d8271ef389f6a3db5bba04859a2bc2a6f4d4d9ac616133b2d1d4a277d0.exe
Resource
win10v2004-20241007-en
General
-
Target
f694c3d8271ef389f6a3db5bba04859a2bc2a6f4d4d9ac616133b2d1d4a277d0.exe
-
Size
208KB
-
MD5
08cfbd657d78b015b851df445f15425a
-
SHA1
2d85ed3a3c851b61c2b8f0fad7eeaf002f410aa8
-
SHA256
f694c3d8271ef389f6a3db5bba04859a2bc2a6f4d4d9ac616133b2d1d4a277d0
-
SHA512
aa3b65e8be5829ecacc18eea5db74af30abfc87e02b029170835bb367078c1ec24458d6d14183ed9d03c532cabc38462c14f8ff06e0801d2a415c2a942e2deb6
-
SSDEEP
6144:mJRDxRqdSqQts6iRZsTZuDbhivDVDN8zqF3F:mcjQKUZigDVJ5T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f694c3d8271ef389f6a3db5bba04859a2bc2a6f4d4d9ac616133b2d1d4a277d0.exe
Files
-
f694c3d8271ef389f6a3db5bba04859a2bc2a6f4d4d9ac616133b2d1d4a277d0.exe.exe windows:4 windows x86 arch:x86
91c8557273d46cefa6ad80b57deb236d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomA
SetCalendarInfoA
FindResourceA
lstrcmp
GetDateFormatW
SetCurrentDirectoryA
CopyFileA
DisconnectNamedPipe
LoadLibraryA
SuspendThread
GetProcAddress
user32
PostQuitMessage
SetFocus
RemoveMenu
EnumChildWindows
MessageBoxIndirectW
GetDC
LoadMenuW
GetActiveWindow
LoadMenuA
EnumDesktopWindows
RegisterWindowMessageA
GetWindowTextW
EnumDesktopsW
GetClassNameA
LoadCursorA
GetWindowTextA
GetTopWindow
LoadBitmapA
GetMenuInfo
GetCapture
wvsprintfA
SetCursorPos
IsDlgButtonChecked
GetMenuStringW
CheckMenuRadioItem
DestroyWindow
SetActiveWindow
AppendMenuW
GetDlgItemTextW
UpdateLayeredWindow
IsChild
CreateDialogParamW
GetMenuStringA
ShowCaret
GetKeyState
GetCaretPos
GetCapture
CreateWindowExA
CheckDlgButton
GetIconInfo
CopyImage
WinHelpA
CopyIcon
DialogBoxParamA
GetDC
gdi32
GetGlyphIndicesA
GetColorAdjustment
GetTextCharset
GetTextColor
CreatePen
SetSystemPaletteUse
SwapBuffers
GetICMProfileA
GetFontUnicodeRanges
StartPage
CreateDCA
SetWinMetaFileBits
advapi32
RegCreateKeyExA
RegDeleteKeyW
RegEnumValueA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExW
RegOpenKeyW
shell32
SHGetDataFromIDListA
SHGetFileInfoW
shlwapi
PathRemoveBlanksW
UrlHashA
PathIsDirectoryEmptyW
StrStrNIW
StrCmpNA
PathIsContentTypeA
PathAppendA
PathRemoveBackslashA
PathSkipRootA
PathGetDriveNumberW
PathSearchAndQualifyW
ole32
CoUninitialize
inetcomm
HrGetLastOpenFileDirectory
MimeEditIsSafeToRun
EssSecurityLabelDecodeEx
CreateSMTPTransport
HrDoAttachmentVerb
MimeOleGetDefaultCharset
MimeOleSMimeCapsFull
oledlg
OleUIChangeSourceA
OleUIUpdateLinksW
OleUIConvertW
OleUIObjectPropertiesA
OleUIUpdateLinksA
OleUIBusyA
OleUIPasteSpecialA
OleUIEditLinksW
crypt32
CryptStringToBinaryA
PFXExportCertStore
CertCreateContext
CertGetCRLFromStore
CertFindChainInStore
CertFindAttribute
RegOpenHKCUKeyExU
I_CertUpdateStore
CertGetIntendedKeyUsage
CertDuplicateCRLContext
CryptMsgControl
CryptBinaryToStringA
Sections
.ZYkKE Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.peSRE Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ig Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 381KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.LI Size: 3KB - Virtual size: 481KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 878B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ