Static task
static1
Behavioral task
behavioral1
Sample
1b2be535e13b40b23c481e91690a4168.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b2be535e13b40b23c481e91690a4168.exe
Resource
win10v2004-20231222-en
General
-
Target
1b2be535e13b40b23c481e91690a4168
-
Size
100KB
-
MD5
1b2be535e13b40b23c481e91690a4168
-
SHA1
217351155ccc9bb6e6fe525c09e3e68f744ef3f4
-
SHA256
1ae08110595e93afcdedc82f1aea3f87cd4b06b275fbff707c043205db1260e1
-
SHA512
c4c14ca8a452febf9f1265e5f11bf799d58cc1739288cf42eefb860e01e1df98543c40d2bdc275814e183e7cf0c9208a2a78d5ba05f133e4f131c8b6251dea5f
-
SSDEEP
768:I2+B3S8SYw0iNPbSUq9PSvoyMtXykKq4HdC5+G:BUS8Sn0IPbS59Pq0IkKj9Ct
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b2be535e13b40b23c481e91690a4168
Files
-
1b2be535e13b40b23c481e91690a4168.exe windows:4 windows x86 arch:x86
c05e870cf610c62981c538714ea09209
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord310
ord566
ord757
ord578
ord2020
ord5975
ord1054
ord3830
ord3641
ord304
ord1084
ord1931
ord1483
ord4098
ord2089
ord1547
ord5915
ord1620
ord1617
ord3946
ord1402
ord4234
ord5152
ord1908
ord5073
ord6275
ord4185
ord5214
ord3403
ord4722
ord4282
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord5213
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2862
ord2991
ord4486
ord3171
ord572
ord591
ord1063
ord5182
ord4212
ord4735
ord4890
ord1671
ord1670
ord1551
ord5912
ord1401
ord4244
ord5203
ord4262
ord3182
ord605
ord354
ord1794
ord4749
ord709
ord501
ord6090
ord784
ord2322
ord2899
ord1123
ord297
ord1489
ord299
ord2933
ord1482
ord5807
ord631
ord5563
ord781
ord2748
ord2288
ord2280
ord386
ord2468
ord4580
ord2131
ord2469
ord3441
ord1903
ord1397
ord6266
ord1933
ord1484
ord4099
ord2091
ord1570
ord4237
ord3229
ord657
ord2092
ord1641
ord1571
ord4238
ord2958
ord3230
ord658
ord3879
ord3875
ord5873
ord3406
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord3683
ord4541
ord443
ord676
ord2372
ord5613
ord5442
ord764
ord2657
ord762
ord4125
ord5713
ord1185
ord4967
ord1207
msvcr71
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
__security_error_handler
memset
fopen
fclose
_getcwd
_time64
_localtime64
strftime
__CxxFrameHandler
free
_setmbcp
_except_handler3
_controlfp
kernel32
GetPrivateProfileStringA
GetPrivateProfileSectionA
WritePrivateProfileStringA
GetPrivateProfileSectionNamesA
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetVersionExA
user32
EnableWindow
GetSystemMetrics
LoadIconA
DrawIcon
GetClientRect
IsIconic
GetWindowRect
SendMessageA
shell32
ShellExecuteA
comctl32
ord17
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ