Static task
static1
Behavioral task
behavioral1
Sample
826b652cd075cd6e919e5513dcb713812de99b4105f99a94c7926e421c1594a0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
826b652cd075cd6e919e5513dcb713812de99b4105f99a94c7926e421c1594a0.exe
Resource
win10v2004-20231020-en
General
-
Target
826b652cd075cd6e919e5513dcb713812de99b4105f99a94c7926e421c1594a0
-
Size
316KB
-
MD5
72673c508a79133985010bb3c5122f06
-
SHA1
8498b08151e34be3c652b373f8c25ac9b064ce5f
-
SHA256
826b652cd075cd6e919e5513dcb713812de99b4105f99a94c7926e421c1594a0
-
SHA512
ce278ec131d71aba4aaffa0461a76a83d9c00e12906f1417193769eff31441f0a7d3e7049de10193c9d038409cf6f1c7bf9991300de7dad71bc2a05eba1f6da9
-
SSDEEP
6144:U0iMy18yBSj+OR8kBLBj67wkQISJ1pMnETSKKjLBkW1/OtbzaBX:U0iMy1zBSjZR8kVBj67wnIeMnETSKKjF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 826b652cd075cd6e919e5513dcb713812de99b4105f99a94c7926e421c1594a0
Files
-
826b652cd075cd6e919e5513dcb713812de99b4105f99a94c7926e421c1594a0.exe windows:4 windows x86
04a31d85ef2a0e36c7526afd36b4cb4a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord825
ord823
ord537
ord2764
ord4278
ord858
ord800
msvcrt
realloc
memset
bsearch
__CxxFrameHandler
qsort
malloc
strcmp
_controlfp
_except_handler3
__set_app_type
free
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
sscanf
strlen
memcpy
kernel32
LoadLibraryA
FreeLibrary
IsBadReadPtr
GetProcessHeap
GetModuleHandleA
GetStartupInfoA
GetProcAddress
user32
EndDialog
DestroyWindow
DefWindowProcA
BeginPaint
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
UpdateWindow
RegisterClassExA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
ShowWindow
msvcp60
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIPBD@Z
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEABDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
Sections
.text Size: 248KB - Virtual size: 246KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ