Static task
static1
Behavioral task
behavioral1
Sample
1dac7f70fb34eed75f16434b83690209.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1dac7f70fb34eed75f16434b83690209.exe
Resource
win10v2004-20231215-en
General
-
Target
1dac7f70fb34eed75f16434b83690209
-
Size
150KB
-
MD5
1dac7f70fb34eed75f16434b83690209
-
SHA1
86a20e22c2799151160b5d3af1f94975e0ba8b04
-
SHA256
c26691d9fd87cdf69475740940423f5f78b6d67512ccbb1df81d999558aad3b4
-
SHA512
0b21ff899fd7a2b246c8670a6fc5638332e5fe21db694d0bd480a8118f3745de8d4e028acbbcd0e5e0995ddd93cf27e328735e3fab6117e053415ee0a920819b
-
SSDEEP
3072:qL5YIWGxI0o3JQSdjaD8BfAqCiZbFW/Q:qtYIWWILKSRabqCMg/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1dac7f70fb34eed75f16434b83690209
Files
-
1dac7f70fb34eed75f16434b83690209.exe windows:4 windows x86 arch:x86
df8c89f5106be48cc0ff0bb75b88bdb7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMenuState
GetDesktopWindow
SetWindowTextA
EnableScrollBar
GetCursor
GetFocus
CallWindowProcA
FillRect
GetPropA
TrackPopupMenu
MessageBoxA
GetIconInfo
FrameRect
CreatePopupMenu
ShowScrollBar
GetKeyState
RegisterClassA
CreateMenu
GetMenuItemID
EnumChildWindows
ShowWindow
DrawTextA
GetKeyNameTextA
GetParent
GetMenuItemCount
BeginPaint
GetDCEx
CreateIcon
EnableWindow
GetClassInfoA
kernel32
InitializeCriticalSection
LocalAlloc
GetStartupInfoA
CompareStringA
FreeLibrary
lstrcatA
GetCurrentThread
MulDiv
VirtualFree
SetEndOfFile
CreateEventA
GetEnvironmentStrings
GlobalFindAtomA
CloseHandle
GetCPInfo
LocalFree
LoadResource
lstrcpynA
SetFilePointer
CreateThread
GetOEMCP
CreateFileA
GetModuleHandleA
ExitThread
LockResource
GetTickCount
GetStringTypeW
HeapDestroy
LoadLibraryExA
ResetEvent
WriteFile
DeleteFileA
SetErrorMode
EnterCriticalSection
GlobalAddAtomA
GetCurrentProcessId
GlobalDeleteAtom
SizeofResource
SetThreadLocale
VirtualAlloc
HeapFree
ExitProcess
MoveFileA
lstrcpyA
HeapAlloc
FindResourceA
GetCurrentProcess
RaiseException
GetDateFormatA
GetModuleFileNameA
SetEvent
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 132KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.init Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ