Static task
static1
Behavioral task
behavioral1
Sample
1b88501a4a63f8511b9f6ef9296e8683.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1b88501a4a63f8511b9f6ef9296e8683.exe
Resource
win10v2004-20231215-en
General
-
Target
1b88501a4a63f8511b9f6ef9296e8683
-
Size
169KB
-
MD5
1b88501a4a63f8511b9f6ef9296e8683
-
SHA1
8e4a86325ba30420f109e391b72161af6ade9d29
-
SHA256
cb8a0331402655e0dbb29cda8d9ef3f9971c9e7d4f45b39831b23b3fa09cdfb3
-
SHA512
86ac662fceb4e3df646f109e6698af7dd79bb9f1f834bc89ad2421898faa2079f836d7cc384428ef5a62a2951f8bccc3f7e2b968dc7941dcdee5934052e13e06
-
SSDEEP
3072:PmlwHQ9PS2uvfr/i3EipPSHP8EWjlnfs0kNhjEpzrkngGIIb:P2P82uvri0icHk5jps0kDjiFG9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b88501a4a63f8511b9f6ef9296e8683
Files
-
1b88501a4a63f8511b9f6ef9296e8683.exe windows:4 windows x86 arch:x86
419042063c68b738ac019fffec1c9454
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
ChangeServiceConfigA
DeleteService
EqualSid
GetSecurityDescriptorControl
LookupPrivilegeValueA
OpenSCManagerA
OpenServiceA
RegDeleteValueA
kernel32
CloseHandle
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateThread
DeleteCriticalSection
DeviceIoControl
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindNextFileA
FindResourceA
FreeLibrary
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDriveTypeA
GetFileAttributesA
GetFileSize
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetStdHandle
GetStringTypeA
GetSystemDirectoryA
GetSystemTime
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GlobalAlloc
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapFree
InterlockedDecrement
InterlockedExchange
IsDebuggerPresent
LeaveCriticalSection
LocalAlloc
LocalFree
LockResource
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
ReadFile
ReadProcessMemory
RemoveDirectoryA
ResetEvent
SearchPathA
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesA
SetFilePointer
SetHandleCount
SetStdHandle
SetUnhandledExceptionFilter
UnmapViewOfFile
WideCharToMultiByte
lstrcmpiA
lstrcpyA
lstrlenA
user32
ClientToScreen
CopyRect
CreatePopupMenu
EnumChildWindows
GetAsyncKeyState
GetCapture
GetDC
GetFocus
GetForegroundWindow
GetKeyState
GetMessagePos
GetParent
GetSysColorBrush
GetSystemMetrics
GetWindowDC
GetWindowThreadProcessId
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadStringA
MessageBoxA
MoveWindow
PeekMessageA
SetWindowTextA
ShowWindow
SystemParametersInfoA
TranslateMessage
UpdateWindow
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 113KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ