Static task
static1
Behavioral task
behavioral1
Sample
1badf0e3043983580a4a1fbf1f1390ab.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1badf0e3043983580a4a1fbf1f1390ab.exe
Resource
win10v2004-20231215-en
General
-
Target
1badf0e3043983580a4a1fbf1f1390ab
-
Size
1.4MB
-
MD5
1badf0e3043983580a4a1fbf1f1390ab
-
SHA1
ae65cc7cccab2bd8534a3500e41d170b223fdbf6
-
SHA256
8ef78cddedbd4aa083d90b09b6b3f797bbb964991be46dcfbdeabc232b36a92e
-
SHA512
eaaac1d5a5016769f9feca00bc8044fbd1edf95082764bd4e49bc65c8420df8adaeca5a76136768f15d155f9b9e44d1a7f5bbaa2bc622e57fcf21c3a5a43d960
-
SSDEEP
24576:nwS0xBUNHlaaEUf5Z1EKkuy5vuvGlIRJsH8x2atFRlr3queJqco:nwoNFasf5zEKZWmOeRJscx2aTqueIco
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1badf0e3043983580a4a1fbf1f1390ab
Files
-
1badf0e3043983580a4a1fbf1f1390ab.exe windows:5 windows x86 arch:x86
cb1e78dde4cc02bfe7c4ca1b96aa2950
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrA
StrNCatA
StrChrA
wnsprintfA
StrToIntA
StrStrIA
PathFileExistsA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
lstrcpyA
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetTempPathA
GetFileAttributesA
MoveFileExA
MultiByteToWideChar
GetModuleHandleA
MapViewOfFile
InterlockedDecrement
WideCharToMultiByte
CreateFileMappingA
OpenFileMappingA
OpenMutexA
GetComputerNameA
FindResourceA
FreeResource
LoadResource
GlobalLock
GlobalAlloc
SizeofResource
MulDiv
GlobalUnlock
GlobalFree
LockResource
GetFullPathNameA
DosDateTimeToFileTime
SetFileTime
GetFileTime
LocalFileTimeToFileTime
GetLocaleInfoA
RtlUnwind
FlushFileBuffers
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
GetVersionExA
GetEnvironmentStrings
FreeEnvironmentStringsA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetEndOfFile
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
GetStringTypeW
GetStringTypeA
VirtualAlloc
DeleteCriticalSection
VirtualFree
HeapCreate
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
HeapSize
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetCommandLineA
GetConsoleMode
GetConsoleCP
GetFileType
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetLocalTime
CreateThread
LocalFree
LocalAlloc
GetVolumeInformationA
SetFilePointer
CreateToolhelp32Snapshot
CreateMutexA
GetModuleFileNameA
Process32Next
lstrcmpiA
GetLastError
ReadFile
TerminateProcess
CreateProcessA
GetExitCodeProcess
Sleep
OpenProcess
GetTickCount
SleepEx
WaitForSingleObject
Process32First
GetFileSize
ExitProcess
WritePrivateProfileStringA
CreateDirectoryA
DeleteFileA
LoadLibraryA
GetPrivateProfileStringA
GetProcAddress
lstrcatA
GetWindowsDirectoryA
GetCurrentProcess
FreeLibrary
lstrcpynA
lstrlenA
CloseHandle
WriteFile
GetProcessHeap
HeapFree
HeapAlloc
CreateFileA
lstrcmpA
InitializeCriticalSection
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
user32
SetCursor
UnregisterClassA
ExitWindowsEx
DrawFocusRect
GetWindowDC
DrawTextA
DrawEdge
GetWindowTextLengthA
IsDlgButtonChecked
CheckRadioButton
EnableWindow
FillRect
GetDlgItem
SetWindowTextA
GetDlgCtrlID
MoveWindow
EndPaint
GetKeyState
GetFocus
GetParent
IsWindowEnabled
BeginPaint
GetDC
GetWindowTextA
SetWindowLongA
InvalidateRect
ReleaseDC
PostMessageA
UpdateWindow
DestroyWindow
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SetFocus
SendMessageA
IsDialogMessageA
TranslateMessage
GetWindowLongA
CreateWindowExA
PeekMessageA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
MessageBoxA
FindWindowA
gdi32
LPtoDP
GetDeviceCaps
DPtoLP
SetMapMode
GetMapMode
CreateDIBitmap
CreateCompatibleBitmap
SetBkColor
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
GetTextExtentPointA
GetObjectA
GetStockObject
TextOutA
advapi32
OpenSCManagerA
QueryServiceStatus
CloseServiceHandle
OpenServiceA
AdjustTokenPrivileges
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
LookupPrivilegeValueA
SetNamedSecurityInfoA
RegDeleteValueA
CheckTokenMembership
RegEnumValueA
RegOpenKeyExA
RegOpenKeyA
SetFileSecurityA
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
RegSetValueExA
RegCloseKey
RegCreateKeyA
RegQueryValueExA
OpenProcessToken
shell32
SHGetFolderPathA
ShellExecuteA
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
VariantClear
Sections
.text Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ