Static task
static1
Behavioral task
behavioral1
Sample
1bfeb1452d00f6ff2aa7129ea12d417a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1bfeb1452d00f6ff2aa7129ea12d417a.exe
Resource
win10v2004-20231215-en
General
-
Target
1bfeb1452d00f6ff2aa7129ea12d417a
-
Size
103KB
-
MD5
1bfeb1452d00f6ff2aa7129ea12d417a
-
SHA1
d84799ebf7e91a73ea8aa736d156d7efb29238d9
-
SHA256
ba097c0b700f93c4929c79f8ee1eda26fd23d0c34613666b5ac80a226a52b549
-
SHA512
06a943a69cf62d801afe161929c1a444c38f1504a5d7d4a1ebe23a365617062a262481ad2ef892320476eb05f6dfe857cd4d4a81f290de653ba046b5abeaba9f
-
SSDEEP
768:V5rZJ3j/nDKxT6IQBY27xUIUA5qeV81MLnVNc4RzeHpZevWCacr1WZBJAyLoouJK:V5fjvG6I4YiNlB8QVNJAHTwRRROaJK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1bfeb1452d00f6ff2aa7129ea12d417a
Files
-
1bfeb1452d00f6ff2aa7129ea12d417a.exe windows:4 windows x86 arch:x86
778ac26f26c75f318f2af7bc7f9ae78b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_GetImageInfo
ImageList_Create
ImageList_LoadImageA
ImageList_LoadImageW
ImageList_LoadImage
ImageList_DrawIndirect
ImageList_Read
ImageList_AddMasked
ImageList_Draw
ImageList_DragShowNolock
ImageList_GetIcon
ImageList_BeginDrag
ImageList_GetImageRect
ImageList_GetIconSize
ImageList_Merge
ImageList_EndDrag
ImageList_Destroy
ImageList_AddMasked
ImageList_GetIconSize
ImageList_LoadImageW
ImageList_DrawEx
ImageList_GetImageRect
ImageList_DragLeave
ImageList_DragEnter
ImageList_BeginDrag
ImageList_GetIcon
InitCommonControls
ImageList_Replace
ImageList_GetDragImage
gdi32
GetCurrentPositionEx
AddFontResourceTracking
GetDCOrgEx
GetBitmapBits
ClearBrushAttributes
CancelDC
GetPixel
AbortPath
AddFontResourceA
GetClipBox
RestoreDC
CreateSolidBrush
AddFontResourceExW
CloseFigure
AddFontMemResourceEx
AbortPath
GetPixel
BeginPath
CloseMetaFile
ClearBrushAttributes
AddFontResourceA
GetPixel
AddFontResourceTracking
GetBrushOrgEx
RestoreDC
DeleteObject
advapi32
RegOpenKeyW
RegEnumKeyA
RegEnumKeyExW
RegGetKeySecurity
RegLoadKeyA
RegDeleteValueW
RegOpenKeyExW
RegOpenKeyExA
RegDeleteKeyW
RegReplaceKeyA
RegQueryInfoKeyW
RegQueryValueA
RegFlushKey
RegEnumValueA
RegEnumValueW
RegDeleteKeyA
RegQueryValueExW
RegCreateKeyExW
RegDeleteKeyW
RegCreateKeyExA
RegEnumValueA
RegDeleteKeyA
RegDeleteValueW
RegEnumValueW
RegEnumKeyW
RegFlushKey
RegQueryValueA
RegOpenKeyExA
RegOpenKeyW
RegQueryInfoKeyW
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExW
RegLoadKeyA
kernel32
CopyFileW
DeleteFileW
GetComputerNameA
OpenFile
GetFileSize
GetFileTime
DeleteFileA
OpenFileMappingA
WriteFile
CopyFileExW
GetLastError
FindAtomA
GetStdHandle
DeleteAtom
CopyFileA
SetLastError
DeleteFileA
GetCommandLineA
ReadFile
GetStdHandle
FindAtomA
ExitThread
GetFileTime
GlobalFree
GetLastError
ReadConsoleA
DeleteAtom
CopyFileExW
DeleteFileA
GetCPInfo
CopyFileW
CopyFileA
GetFileTime
ExitThread
OpenFile
GetConsoleMode
CreateDirectoryA
GetFileSize
ReadFile
GetCommandLineA
GetFileTime
CopyFileA
Sleep
FindFirstFileA
GetComputerNameA
DeleteFileW
GetCPInfo
ExitThread
CopyFileW
GetStdHandle
GlobalFree
CreateProcessA
OpenFile
WriteFile
DeleteFileA
ReadFile
FindAtomA
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 499B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ