Static task
static1
Behavioral task
behavioral1
Sample
1a78da01bbc051b43b14045614e5084b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a78da01bbc051b43b14045614e5084b.exe
Resource
win10v2004-20231222-en
General
-
Target
1a78da01bbc051b43b14045614e5084b
-
Size
1.2MB
-
MD5
1a78da01bbc051b43b14045614e5084b
-
SHA1
0ab7c6dc38e7c9480fc436926441072a290c2c49
-
SHA256
e6ecef7c494d9688d286711a526362086e75a7e94b40c2ab134b37a76b2eef83
-
SHA512
3aa030da76fec0d23006c8df58222a7699dccc05ddce93e1adfed49c4dacfac2fd4afa1c8a9f9aff8feee3bad82db72a494c3e8fa705de77ffad67fc69006d3e
-
SSDEEP
24576:ck4mis6OmdNmRysg6BO3MlaRJl4WrLD5RS9b8bINHgxW:xih5mRVzFlYgy5Sby6m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a78da01bbc051b43b14045614e5084b
Files
-
1a78da01bbc051b43b14045614e5084b.exe windows:4 windows x86 arch:x86
2fe7186799fbf59e0b564cf19f1b4b59
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathCombineA
PathFileExistsA
comctl32
InitCommonControlsEx
ord17
kernel32
GetLocaleInfoA
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
GetCPInfo
GetOEMCP
VirtualProtect
IsBadCodePtr
IsBadReadPtr
VirtualQuery
InterlockedExchange
SetFilePointer
IsBadWritePtr
VirtualAlloc
HeapSize
HeapReAlloc
VirtualFree
HeapCreate
HeapDestroy
GetFileType
MultiByteToWideChar
ReadFile
GetSystemInfo
CreateFileA
CloseHandle
LoadLibraryA
WaitForSingleObject
DeleteFileA
GetTempPathA
WideCharToMultiByte
GetEnvironmentStringsW
GetACP
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetLastError
CreateDirectoryA
ExitProcess
RtlUnwind
RaiseException
RemoveDirectoryA
GetSystemTimeAsFileTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameA
HeapFree
SetUnhandledExceptionFilter
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
SetHandleCount
user32
SendDlgItemMessageA
SetFocus
ShowWindow
DestroyWindow
CreateDialogParamA
SetWindowPos
SetDlgItemTextA
GetDlgItem
DialogBoxParamA
SetWindowLongA
LoadIconA
SetWindowTextA
CreateWindowExW
EndDialog
MessageBoxA
GetClassInfoExW
RegisterClassExW
FillRect
CallWindowProcA
BeginPaint
SendMessageA
GetClientRect
GetWindowTextA
GetWindowLongA
EndPaint
gdi32
CreateSolidBrush
DeleteObject
SetBkMode
SetTextColor
TextOutA
CreateFontIndirectA
SelectObject
advapi32
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
shell32
ShellExecuteExW
ShellExecuteExA
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.boom Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE