Static task
static1
Behavioral task
behavioral1
Sample
44b3ef9f0023a18420c37599f408c8f993e6214f5825d46ba9e2aed7c3c4f3e1.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
44b3ef9f0023a18420c37599f408c8f993e6214f5825d46ba9e2aed7c3c4f3e1.exe
Resource
win10v2004-20231025-en
General
-
Target
44b3ef9f0023a18420c37599f408c8f993e6214f5825d46ba9e2aed7c3c4f3e1
-
Size
79KB
-
MD5
a0b0c617b60eaac774bb4598e410bce2
-
SHA1
51f6961f896ab1e5119231387683778c46e23407
-
SHA256
44b3ef9f0023a18420c37599f408c8f993e6214f5825d46ba9e2aed7c3c4f3e1
-
SHA512
700efab5b6f713f160c453a8566aa3f53c9a17ebf7b68c63291cba6b3bd0d92ebe1e70e756f85d2b2e53227eeaad0b2ce82eace3e53aa295acde6a2892c9edc1
-
SSDEEP
1536:63NDxLCWaxqPBCJT/BmhoyRZJiml4k6+frP4xT1yBH2/3PDGFqq4qcP+TEXg:63/CBqqTZ0Nc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44b3ef9f0023a18420c37599f408c8f993e6214f5825d46ba9e2aed7c3c4f3e1
Files
-
44b3ef9f0023a18420c37599f408c8f993e6214f5825d46ba9e2aed7c3c4f3e1.exe windows:5 windows x86
f84a59a26c428296793717e402e9abfb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
imm32
ImmGetDefaultIMEWnd
kernel32
CloseHandle
CreateMutexW
DeleteCriticalSection
EnterCriticalSection
EnumResourceNamesW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetLocaleInfoW
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
OutputDebugStringA
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnwprintf
_wcmdln
_wcsicmp
abort
calloc
exit
free
fwrite
malloc
memmove
signal
strncmp
vfprintf
wcslen
wcstoul
shell32
ShellExecuteW
Shell_NotifyIconW
shlwapi
ord439
gdi32
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectW
DeleteDC
DeleteObject
GetStockObject
PatBlt
SelectObject
SetBkMode
SetDCBrushColor
SetTextColor
user32
ActivateKeyboardLayout
CheckMenuItem
CreateIconIndirect
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DestroyIcon
DestroyMenu
DispatchMessageW
DrawIconEx
DrawTextW
EnumWindows
FillRect
GetAncestor
GetClassNameW
GetCursorPos
GetDC
GetForegroundWindow
GetKeyboardLayout
GetKeyboardLayoutList
GetMessageW
GetSubMenu
GetSysColor
GetSysColorBrush
GetSystemMetrics
GetWindowThreadProcessId
InsertMenuItemW
IsWindow
IsWindowVisible
LoadCursorW
LoadImageW
LoadKeyboardLayoutW
LoadMenuW
MessageBoxW
PostMessageW
PostQuitMessage
RegisterClassW
RegisterShellHookWindow
RegisterWindowMessageW
ReleaseDC
SetForegroundWindow
SetProcessDefaultLayout
SetRect
SystemParametersInfoW
TrackPopupMenu
TranslateMessage
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 32KB - Virtual size: 31KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ