Static task
static1
Behavioral task
behavioral1
Sample
lab432v17.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
lab432v17.exe
Resource
win10v2004-20230915-en
General
-
Target
lab432v17.exe
-
Size
2.5MB
-
MD5
c62370d795a0b9bb2e93477138308a99
-
SHA1
0ce64a75227293ac65c935a3435e20236b9e2394
-
SHA256
a38cfa70addef7413dcc3662792a6ca394b5348530caac120c3fe3f6a0b7d7c1
-
SHA512
5d099a866482912baaaa0b1fb047735cf21bf382bb5633388eda00b0a3789ac13ecf082a1bf900b64b6fbce1da0cac6723abfc511ef71ad5f1e9b4da7d1b8d83
-
SSDEEP
49152:SFMMMM0DVNSlyZgUjv486pi0O8QbkEPpRispZDDxixuLF/bwihIw:UMMMM0hMl+gUAg0O8QbkAX7ZP0xuJ/yw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource lab432v17.exe
Files
-
lab432v17.exe.exe windows x86
b338f655615093e13bf9ca8cccdb4f0e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnWire
lstrcmpiA
DeleteFileA
SetFilePointer
WriteFile
CreateDirectoryA
RemoveDirectoryA
GetDriveTypeA
SizeofResource
LockResource
LoadResource
FindResourceA
GlobalWire
lstrlenA
GlobalFree
GetModuleHandleA
IsDBCSLeadByte
WinExec
FindClose
FindNextFileA
SetErrorMode
GetTempPathA
GetSystemTime
_lclose
_lopen
GetCurrentDirectoryA
SetCurrentDirectoryA
lstrcatA
GetModuleFileNameA
FindFirstFileA
CreateFileA
LocalAlloc
lstrcpyA
GlobalUnlock
CloseHandle
ReadFile
GetDiskFreeSpaceA
GlobalAlloc
_lwrite
SetEndOfFile
FreeResource
GlobalLock
FlushFileBuffers
SetStdHandle
VirtualAlloc
VirtualFree
GetFileType
GetStdHandle
UnhandledExceptionFilter
RtlUnwind
ExitProcess
GetLastError
GetCPInfo
GetOEMCP
GetACP
MultiByteToWideChar
GetProcAddress
WideCharToMultiByte
GetVersion
GetCommandLineA
GetEnvironmentStrings
GetStartupInfoA
GlobalReAlloc
user32
CharNextA
CreateWindowExA
ShowWindow
UpdateWindow
CharPrevA
wsprintfA
IsCharAlphaA
SetWindowPos
LoadCursorA
LoadIconA
RegisterClassA
LoadStringA
GetActiveWindow
SetTimer
GetDC
ReleaseDC
SetRect
DefWindowProcA
PostQuitMessage
KillTimer
DestroyWindow
GetMessageA
TranslateMessage
DispatchMessageA
BeginPaint
FillRect
GetSysColor
GetClientRect
DrawTextA
EndPaint
GetWindowRect
GetSystemMetrics
MessageBoxA
gdi32
DeleteObject
SelectObject
SetBkColor
SetTextColor
GetStockObject
DeleteDC
BitBlt
CreateSolidBrush
GetObjectA
ExcludeClipRect
CreateCompatibleDC
SelectPalette
CreatePalette
RealizePalette
CreateDIBitmap
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
_APPINIT Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 7KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 105B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 327KB - Virtual size: 327KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ