Static task
static1
Behavioral task
behavioral1
Sample
04bb350f055316e42c0105954c4286e0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
04bb350f055316e42c0105954c4286e0.exe
Resource
win10v2004-20231222-en
General
-
Target
04bb350f055316e42c0105954c4286e0
-
Size
1.5MB
-
MD5
04bb350f055316e42c0105954c4286e0
-
SHA1
84447d2984697ae73dfcd9d109a44a9fe6c34e95
-
SHA256
e6566a14d70443f1812d337e3b302e1720bb13cd7448b7f5f2f0a146988dc1be
-
SHA512
3f7f5becd69e4de5290ee0fe3b90775431286f322df27036282e61efe05d170befa446828314be5ce106685abc810d7319847b929a4c16a0ed4c13c0b1525a42
-
SSDEEP
24576:/G5EOH+E7BGX6kxS1K9WzYpqXmSL4FEdQpYM2sVn69izHvIR0rRzUPHY9o:/G5EpHMK9WyemSL4FGQueV6QHKSI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04bb350f055316e42c0105954c4286e0
Files
-
04bb350f055316e42c0105954c4286e0.exe windows:4 windows x86 arch:x86
f365e68c7397d859bb6af7ff564f42e0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetModuleHandleA
GetProcAddress
user32
GetCursor
advapi32
AddAccessAllowedAce
oleaut32
SysReAllocStringLen
version
VerQueryValueA
gdi32
SetDIBColorTable
ole32
OleInitialize
comctl32
ImageList_DragEnter
shell32
SHGetMalloc
winmm
mciSendStringA
wsock32
WSAGetLastError
msimg32
GradientFill
Sections
.BJOD Size: 1.5MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.BJOD Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE