Static task
static1
Behavioral task
behavioral1
Sample
43f19d12886ed8d0ebe382b76f932011.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43f19d12886ed8d0ebe382b76f932011.exe
Resource
win10v2004-20231215-en
General
-
Target
43f19d12886ed8d0ebe382b76f932011
-
Size
103KB
-
MD5
43f19d12886ed8d0ebe382b76f932011
-
SHA1
1006b0a100f9464af1be83ec02e150a10c05de1b
-
SHA256
f00df0c9c127ad09e3bc49fb90e11e6bc08029576e9a7e09a9a4584ea5776ec1
-
SHA512
f0b246d836045c9b5cab4ef03d28ed560edd39bf249a3f9926a7147773d0b8a262cffb8c4b3c027846b6bd6179c0550d2d708e4a4ce7c7991422672abaaadbd3
-
SSDEEP
1536:ohAiZhsHwLIBonPQkScNF1pa8gnKlRZDfInmxY5lHkxrhC:oh5Zh4wMuPMq0qDsmx+O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43f19d12886ed8d0ebe382b76f932011
Files
-
43f19d12886ed8d0ebe382b76f932011.exe windows:4 windows x86 arch:x86
ffca4ed3b5b6907540b2c5f3ceae0dbd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMenuStringA
DispatchMessageA
CharLowerBuffA
DefMDIChildProcA
CreateMenu
DrawIconEx
FillRect
EnableWindow
MessageBoxA
GetActiveWindow
GetKeyNameTextA
SetCursor
GetDlgItem
GetClipboardData
EnumChildWindows
GetCapture
GetSysColor
ShowWindow
EqualRect
IsWindowVisible
DrawFrameControl
SetWindowPos
GetIconInfo
BeginPaint
CallNextHookEx
DrawTextA
DeferWindowPos
IsMenu
EndPaint
DefWindowProcA
GetLastActivePopup
EnumThreadWindows
CheckMenuItem
GetScrollPos
TrackPopupMenu
GetCursorPos
EnableScrollBar
SetWindowLongA
CallWindowProcA
DispatchMessageW
IsWindowEnabled
DefFrameProcA
FrameRect
SetWindowTextA
EndDeferWindowPos
GetMenuItemCount
EnumWindows
GetWindow
GetCursor
GetKeyState
ClientToScreen
ShowScrollBar
GetMessagePos
GetDesktopWindow
CreateIcon
IsChild
GetScrollRange
GetParent
CharNextA
msvcrt
cos
memmove
strncmp
kernel32
RaiseException
CloseHandle
GlobalFindAtomA
GetCurrentThread
LockResource
HeapDestroy
WideCharToMultiByte
GetFileSize
GetProcAddress
SetEndOfFile
CreateFileA
MoveFileA
GetLocalTime
ReadFile
GetVersionExA
FreeResource
VirtualAlloc
SizeofResource
GetStartupInfoA
GetDateFormatA
GetStdHandle
GlobalDeleteAtom
GetSystemDefaultLangID
GlobalAlloc
MulDiv
Sleep
SetThreadLocale
EnterCriticalSection
DeleteFileA
GetCurrentThreadId
VirtualFree
VirtualQuery
ResetEvent
GetCPInfo
FindClose
GlobalAddAtomA
GetCurrentProcessId
LoadLibraryA
LoadResource
LocalReAlloc
GetFileType
ExitProcess
InitializeCriticalSection
SetLastError
WriteFile
HeapFree
GetACP
VirtualAllocEx
GetStringTypeW
FindResourceA
HeapAlloc
GetDiskFreeSpaceA
CreateEventA
lstrcmpiA
FormatMessageA
GetTickCount
GetEnvironmentStrings
CreateThread
lstrlenA
WaitForSingleObject
FreeLibrary
MoveFileExA
GetFullPathNameA
GetOEMCP
lstrcpynA
LocalAlloc
SetErrorMode
GetProcessHeap
GetCommandLineA
LoadLibraryExA
GetUserDefaultLCID
GetFileAttributesA
GetModuleHandleA
DeleteCriticalSection
ExitThread
lstrcatA
GetLocaleInfoA
CompareStringA
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE