Static task
static1
Behavioral task
behavioral1
Sample
26d6dbd410ed0a3485e863878bb25ed2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26d6dbd410ed0a3485e863878bb25ed2.exe
Resource
win10v2004-20231222-en
General
-
Target
26d6dbd410ed0a3485e863878bb25ed2
-
Size
121KB
-
MD5
26d6dbd410ed0a3485e863878bb25ed2
-
SHA1
274e3d7ce2779112ace9d53eb63189323e5409cf
-
SHA256
bb15a4ea3326963dcc936dd1913e08c36163aaf563efa798d60b869b2e5bcbee
-
SHA512
8ce33d84003e802e1223e76a7f76a2dd0da587c017b686bd08201ef221358d0ea49a61e2b249e94ae23f5b11f2043d026a1762ae4cac1372a2be5da8f0e2db70
-
SSDEEP
3072:TkKg52nlxCq/IC3r5IGq5hFRZFKX6/QdR5ON1lmSbReH:TkKJlx3HJq5NKqI8lm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26d6dbd410ed0a3485e863878bb25ed2
Files
-
26d6dbd410ed0a3485e863878bb25ed2.exe windows:4 windows x86 arch:x86
0ec5f204f5eb9404adb966463ea8ecd6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
CreateThread
ExitProcess
ExitThread
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
IsValidLocale
LoadLibraryA
QueryPerformanceCounter
SetUnhandledExceptionFilter
VirtualAlloc
VirtualProtect
VirtualQueryEx
msvcrt
fwrite
fseek
strcpy
atol
strncmp
wscanf
user32
RegisterWindowMessageA
GetCapture
DefFrameProcA
GetDesktopWindow
comctl32
ShowHideMenuCtl
InitCommonControls
CreateStatusWindowA
oleaut32
VarWeekdayName
VarI4FromI1
VarI2FromUI4
VarFormat
VarDecDiv
VarCySu
VarCyFromR8
RegisterActiveObject
Sections
.text Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ