Static task
static1
Behavioral task
behavioral1
Sample
1bf2a18afa60dc44912f93b19fa6b25755d4aada9b10415acedd46d6d9b8d320.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1bf2a18afa60dc44912f93b19fa6b25755d4aada9b10415acedd46d6d9b8d320.exe
Resource
win10v2004-20230831-en
General
-
Target
1bf2a18afa60dc44912f93b19fa6b25755d4aada9b10415acedd46d6d9b8d320
-
Size
172KB
-
MD5
35ff5de8ca1ce6b4cf2be2b111bbdb2c
-
SHA1
30690c669aad46206d4e43732196a6a2a504f7ab
-
SHA256
1bf2a18afa60dc44912f93b19fa6b25755d4aada9b10415acedd46d6d9b8d320
-
SHA512
4f0c95600ec6e2b930d699bbdaf002ea055eb60df49787ccff583bbc586ad74f5bedbb87a470d66352519fca409c7f62a218d01c422f063d8892d9640affb661
-
SSDEEP
3072:9xkMBgdHxFbNqGeKOH66g7+t3FBTyqKKoQ7hV9oOw:9xBBgdHTN9AQCtTy7Q1VyL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1bf2a18afa60dc44912f93b19fa6b25755d4aada9b10415acedd46d6d9b8d320
Files
-
1bf2a18afa60dc44912f93b19fa6b25755d4aada9b10415acedd46d6d9b8d320.exe windows x86
609d9c126c90aeeb1078596483a68811
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
RegSetValueExW
comctl32
InitCommonControlsEx
getuname
GetUName
kernel32
DeleteCriticalSection
EnterCriticalSection
FreeLibrary
GetCPInfoExW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
MultiByteToWideChar
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
lstrcpynW
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_wcmdln
abort
calloc
exit
free
fwrite
malloc
memmove
memset
signal
strncmp
vfprintf
wcschr
wcscpy
wcsncpy
gdi32
CreateFontIndirectW
CreatePen
DeleteObject
EnumFontFamiliesExW
GetDeviceCaps
GetGlyphIndicesW
GetObjectW
GetStockObject
GetTextMetricsW
Rectangle
SelectObject
user32
AppendMenuW
BeginPaint
CreateDialogParamW
CreateWindowExW
DefWindowProcW
DestroyIcon
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawFocusRect
DrawTextW
EnableWindow
EndDialog
EndPaint
FillRect
GetClientRect
GetDC
GetDlgItem
GetFocus
GetKeyState
GetMessageW
GetParent
GetSystemMenu
GetSystemMetrics
GetUpdateRect
GetWindowLongW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
InflateRect
IntersectRect
InvalidateRect
IsDialogMessageW
IsWindow
LoadCursorW
LoadImageW
LoadStringW
MapWindowPoints
MoveWindow
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterClassW
ReleaseDC
ScrollWindowEx
SendDlgItemMessageW
SendMessageW
SetFocus
SetProcessDefaultLayout
SetScrollPos
SetScrollRange
SetWindowLongW
SetWindowTextW
ShowWindow
TranslateMessage
UnregisterClassW
UpdateWindow
wsprintfW
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 36KB - Virtual size: 36KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ