?_GetCaretBlinkTime@@YGPAX_KDI@Z
Static task
static1
Behavioral task
behavioral1
Sample
03f52160bac9e1d93663925e3860298f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03f52160bac9e1d93663925e3860298f.exe
Resource
win10v2004-20231215-en
General
-
Target
03f52160bac9e1d93663925e3860298f
-
Size
148KB
-
MD5
03f52160bac9e1d93663925e3860298f
-
SHA1
5627200b91a21e5b016c90e9b60c49273d39a9c2
-
SHA256
e48c68be9a84be9fdb5bb206d3701b0b2a2c245239a892aa52199daa2c2967aa
-
SHA512
959546fe570e91840e434e98fc9eacb9052a1d0128c26f8249b5dd534cf0da31cb6c70ef586f390822b585dd0f79ff34d4e29c0dfc34203a6d9aece94c4ed464
-
SSDEEP
3072:CeyKmlhhUlei00rnPY1HPqciOBwlWH3k55B:pufhUoknPY1Hyhxgk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03f52160bac9e1d93663925e3860298f
Files
-
03f52160bac9e1d93663925e3860298f.exe windows:5 windows x86 arch:x86
e20bb4b67e207a536d73cb11bccbbf74
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrCmpNIA
PathCanonicalizeA
StrRChrA
ord158
ChrCmpIW
PathFindFileNameW
shell32
SHCreateQueryCancelAutoPlayMoniker
kernel32
CreateMailslotA
GetCommConfig
CopyFileA
CreateFileMappingA
FileTimeToDosDateTime
OpenJobObjectA
GetDllDirectoryW
GlobalFlags
lstrcatW
GetHandleInformation
CreateTapePartition
TransmitCommChar
GetCommMask
OpenFileMappingW
lstrcpyA
CreateWaitableTimerW
OpenEventA
LoadLibraryExW
FlushFileBuffers
user32
SetScrollRange
EnumDisplaySettingsA
CallNextHookEx
AttachThreadInput
ChangeMenuA
DefDlgProcW
OpenDesktopA
GetDoubleClickTime
GetMonitorInfoA
SetPropW
GetKeyboardLayoutNameW
SetWindowContextHelpId
GetMenuStringA
CreatePopupMenu
IsDlgButtonChecked
SetCaretPos
SetWindowTextW
SendMessageCallbackA
LoadBitmapA
DestroyIcon
gdi32
ExtSelectClipRgn
Polyline
GetEnhMetaFilePaletteEntries
GetPath
CreateDiscardableBitmap
FixBrushOrgEx
SetTextJustification
GetTextAlign
GetPaletteEntries
CreateMetaFileA
GetCurrentObject
CreateEnhMetaFileW
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.icode Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.m_data Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MData Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c_data Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.n_data Size: 1024B - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ