Static task
static1
Behavioral task
behavioral1
Sample
b26085eb22d59b54d31adbb5506c028b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b26085eb22d59b54d31adbb5506c028b.exe
Resource
win10v2004-20231215-en
General
-
Target
b26085eb22d59b54d31adbb5506c028b
-
Size
756KB
-
MD5
b26085eb22d59b54d31adbb5506c028b
-
SHA1
03fc3bdc0d163729e41b5ca5e12b702cbe86a7ce
-
SHA256
8116e9d560b069235227c2af1d891e95ee7340591a9c56b101530a3d402e6334
-
SHA512
6dc163c3fd829ae111c8e0c4e3f26b6a9dde4a5875e21fadc858e4f55a440ccc8ca2fbdb8704db77c2ac6f368619eddc46398d247dfd9296d42bb96c85c37c8a
-
SSDEEP
12288:zwEkhAsgBYMKXNfxTKfK1m4xNuRYNoPzPdUHpANqU5s03j:zZIMWRxTT1m47uuMP2pAsU5s0z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b26085eb22d59b54d31adbb5506c028b
Files
-
b26085eb22d59b54d31adbb5506c028b.exe windows:4 windows x86 arch:x86
ae09083c899c1c4d91ba63d5814f0275
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
joyGetNumDevs
joyGetDevCapsA
joyGetPosEx
ddraw
DirectDrawCreateEx
DirectDrawEnumerateExA
dsound
ord1
kernel32
FlushFileBuffers
GetFileSize
MapViewOfFile
ReadFile
UnmapViewOfFile
VirtualFree
CreateFileMappingA
DeleteFileA
FreeResource
LockResource
SetFilePointer
FindResourceA
GlobalMemoryStatus
SetEndOfFile
VirtualAlloc
IsBadReadPtr
GetLastError
GetModuleHandleA
GetProcAddress
LoadLibraryA
GetVersionExA
GetWindowsDirectoryA
CompareStringA
CompareStringW
SetEnvironmentVariableA
WriteFile
CreateThread
CloseHandle
CreateFileA
Sleep
SetThreadPriority
TerminateThread
GetSystemInfo
GetTickCount
LoadResource
LCMapStringW
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadWritePtr
LCMapStringA
SetUnhandledExceptionFilter
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
WideCharToMultiByte
HeapAlloc
HeapReAlloc
HeapFree
RaiseException
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
RtlUnwind
GetLocalTime
GetSystemTime
GetTimeZoneInformation
user32
EndDialog
GetDlgItemTextA
SetWindowTextA
PostMessageA
MessageBeep
MessageBoxA
DestroyWindow
GetCursorPos
SetTimer
UpdateWindow
ShowWindow
CreateWindowExA
GetSystemMetrics
UnregisterClassA
GetClassInfoA
RegisterClassA
GetWindowRect
SetWindowPos
GetParent
SetFocus
GetClientRect
ClientToScreen
GetDC
ReleaseDC
DrawTextA
GetMessageA
PeekMessageA
DispatchMessageA
WaitMessage
SetCursor
DefWindowProcA
PostQuitMessage
SetCursorPos
LoadIconA
LoadCursorA
RegisterClassExA
DialogBoxParamA
SendDlgItemMessageA
TranslateMessage
wsprintfA
gdi32
SetBkMode
SetTextColor
GetStockObject
GetPaletteEntries
StretchBlt
advapi32
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteA
Sections
.text Size: 224KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 492KB - Virtual size: 564KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE