Static task
static1
Behavioral task
behavioral1
Sample
01ba8b1544ceae6a970d8de35e7d7926.exe
Resource
win7-20231215-en
General
-
Target
01ba8b1544ceae6a970d8de35e7d7926
-
Size
651KB
-
MD5
01ba8b1544ceae6a970d8de35e7d7926
-
SHA1
46a82757b0c36165125fbb860cc990e2c77d6668
-
SHA256
301426041e2ec586454eebbe46d8ceb5b64748950d5866f83d6682f32dadea54
-
SHA512
7af1c937789bed8b65ea79e224480953e6039c87daeb49845d70b37334e1a7cacb945d859465d0c276ad15ee28cc9a0928f500b920e53e2e5e98526fa2458864
-
SSDEEP
12288:ORpNDv/EMB8KXuj5TW2EhqDeOFHfNPj8Q1AeVIfLVpJgUtmwZ0WT:ikkX4HD8Q1AUOBtmwiWT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01ba8b1544ceae6a970d8de35e7d7926
Files
-
01ba8b1544ceae6a970d8de35e7d7926.exe windows:5 windows x86 arch:x86
55d05027ee997af11c1186645fc3d3fd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
GetVersionExW
lstrcpynA
lstrlenA
lstrcpynW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
LockResource
FindResourceExW
Sleep
WideCharToMultiByte
VirtualAlloc
HeapFree
GetProcessHeap
VirtualFree
LoadLibraryA
IsBadReadPtr
HeapAlloc
GetCommandLineW
SetStdHandle
WriteConsoleW
CloseHandle
SetFilePointer
FlushFileBuffers
GetModuleHandleW
GetConsoleCP
GetStringTypeW
LoadLibraryW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
ExitProcess
HeapCreate
GetStdHandle
WriteFile
IsDebuggerPresent
CreateFileW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
lstrlenW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
GetConsoleMode
RaiseException
InterlockedPushEntrySList
IsProcessorFeaturePresent
HeapDestroy
HeapReAlloc
HeapSize
RtlUnwind
DecodePointer
EncodePointer
HeapSetInformation
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
user32
DefWindowProcW
CharNextW
SetWindowLongW
GetWindowLongW
IsWindow
TrackPopupMenuEx
PeekMessageW
PtInRect
MessageBeep
SetWindowPos
CallWindowProcW
RemoveMenu
AppendMenuW
MonitorFromPoint
GetMonitorInfoW
CreatePopupMenu
GetMenuItemCount
DestroyMenu
LoadStringA
PostQuitMessage
SetFocus
LoadStringW
InvalidateRect
GetWindowRect
TranslateAcceleratorW
SetMenuDefaultItem
GetMenuItemInfoW
SetMenuItemInfoW
MapWindowPoints
GetClientRect
SendMessageW
ole32
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
oleaut32
VarUI4FromStr
advapi32
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
Sections
.text Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 442KB - Virtual size: 441KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ