Static task
static1
Behavioral task
behavioral1
Sample
44a8955d7b55ca9567fa2b1721c6f8b0fa3f8261ed8cdc1d77d1363c63be4bc1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
44a8955d7b55ca9567fa2b1721c6f8b0fa3f8261ed8cdc1d77d1363c63be4bc1.exe
Resource
win10v2004-20230915-en
General
-
Target
44a8955d7b55ca9567fa2b1721c6f8b0fa3f8261ed8cdc1d77d1363c63be4bc1
-
Size
176KB
-
MD5
80740b87614908846e0838c52061f1c1
-
SHA1
def526dfefe06bbfc752d712adbe8359fc2d00c2
-
SHA256
44a8955d7b55ca9567fa2b1721c6f8b0fa3f8261ed8cdc1d77d1363c63be4bc1
-
SHA512
ac1524e5fc91dca639a45aac95538d516d530cc7d2d6cfddc54a024438852ff25f11643186e0381c8109a33e7ca47162a5cf44d42e9d6c8bebec3d968f6f4945
-
SSDEEP
1536:bAul589AqnC1toN6YVbqN+qH5DZUzdEfb3v7zHPKoauh:bXl58+qAo9V3qHfKQzHyoao
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44a8955d7b55ca9567fa2b1721c6f8b0fa3f8261ed8cdc1d77d1363c63be4bc1
Files
-
44a8955d7b55ca9567fa2b1721c6f8b0fa3f8261ed8cdc1d77d1363c63be4bc1.exe windows:4 windows x86
626aaa41fc6c529b95ad5c94042d8c91
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
cbaiodevinterface
cb_port_setTimeout
cb_port_OpenDevice
ReadCard
cb_port_CloseDevice
kernel32
WritePrivateProfileStringA
lstrcpyA
Sleep
CreateThread
GlobalUnlock
GlobalLock
GlobalAlloc
GetPrivateProfileIntA
GetModuleFileNameA
LCMapStringA
MultiByteToWideChar
SetStdHandle
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
HeapValidate
IsBadReadPtr
IsBadWritePtr
SetFilePointer
SetConsoleCtrlHandler
GetLastError
LCMapStringW
VirtualFree
HeapFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedIncrement
LoadLibraryA
GetProcAddress
OutputDebugStringA
InterlockedDecrement
WriteFile
GetStdHandle
DebugBreak
ExitProcess
GetVersion
CloseHandle
GetStringTypeA
GetStringTypeW
FlushFileBuffers
RtlUnwind
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
user32
LoadStringA
GetForegroundWindow
FindWindowA
GetMessageA
TranslateMessage
DispatchMessageA
ModifyMenuA
GetCursorPos
SetForegroundWindow
TrackPopupMenu
DialogBoxParamA
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcA
RegisterWindowMessageA
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassExA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
keybd_event
PostMessageA
SendMessageA
LoadIconA
CreatePopupMenu
AppendMenuA
SendDlgItemMessageA
CheckDlgButton
SetDlgItemInt
EndDialog
IsDlgButtonChecked
MessageBoxA
GetDlgItemInt
wsprintfA
GetDlgItem
EnableWindow
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
shell32
Shell_NotifyIconA
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ