Static task
static1
Behavioral task
behavioral1
Sample
b9645fa1ad0efb4a93c4cd80104f99cef4e005ed37b65fb53242ca47f473fe50.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b9645fa1ad0efb4a93c4cd80104f99cef4e005ed37b65fb53242ca47f473fe50.exe
Resource
win10v2004-20231020-en
General
-
Target
b9645fa1ad0efb4a93c4cd80104f99cef4e005ed37b65fb53242ca47f473fe50
-
Size
72KB
-
MD5
55d7b516ba9f8930577af4a22da70d83
-
SHA1
5dddd015a5cae13de4b12f352667829d4da2ecce
-
SHA256
b9645fa1ad0efb4a93c4cd80104f99cef4e005ed37b65fb53242ca47f473fe50
-
SHA512
4234d6cd8776c62fa817bb30b46b667b5e5889110663c80a8c533b057d583a227c128af580133b04783e7aab82066098f2fee4c72d1e5dde38863c5a3d56e02b
-
SSDEEP
768:1DtdBHEaj9KzRXWBCJ5VhME/TcLPbWac0rvZwNvtfKiNfXioUyzUfWMdUr59Wv:FB5LBCJT/TSVjDfWXrfW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9645fa1ad0efb4a93c4cd80104f99cef4e005ed37b65fb53242ca47f473fe50
Files
-
b9645fa1ad0efb4a93c4cd80104f99cef4e005ed37b65fb53242ca47f473fe50.exe windows:5 windows x86
cae9861be4ba53d1f9d0552d8cecc4c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegEnumValueW
RegOpenKeyExW
RegQueryValueExW
kernel32
CloseHandle
CreateMutexW
DeleteCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetLocaleInfoW
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_ultow
_unlock
_vsnwprintf
_wcmdln
_wcsupr
_wtoi
abort
calloc
exit
fprintf
free
fwrite
malloc
memmove
signal
strncmp
vfprintf
wcslen
wcstoul
shell32
ShellExecuteExW
Shell_NotifyIconW
gdi32
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontW
DeleteDC
DeleteObject
ExtTextOutW
PatBlt
SelectObject
SetBkColor
SetTextColor
user32
AppendMenuW
CheckMenuItem
CreateIconIndirect
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DestroyMenu
DispatchMessageW
DrawTextW
EnumWindows
GetCursorPos
GetDC
GetKeyboardLayout
GetMessageW
GetSubMenu
GetSysColor
GetWindowThreadProcessId
LoadKeyboardLayoutW
LoadMenuW
LoadStringW
MessageBoxW
PostMessageW
PostQuitMessage
RegisterClassW
RegisterShellHookWindow
RegisterWindowMessageW
ReleaseDC
SendMessageW
SetForegroundWindow
SetProcessDefaultLayout
TrackPopupMenu
TranslateMessage
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 26KB - Virtual size: 26KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ