Static task
static1
Behavioral task
behavioral1
Sample
26f74bd390e23eee78b64b101eb19645.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26f74bd390e23eee78b64b101eb19645.exe
Resource
win10v2004-20231215-en
General
-
Target
26f74bd390e23eee78b64b101eb19645
-
Size
140KB
-
MD5
26f74bd390e23eee78b64b101eb19645
-
SHA1
07f248745531fc6bd264a4f0d5d1a90d12f894c5
-
SHA256
c614ea6d185cc68891f4a9a16a6915286be72b704d10a7f9e40f82f6db757895
-
SHA512
40ca0346dd0bcae5e1e585fcf85529b26ee35fe92e45fd0804041f9f1228085c5bc0f6260ef23c8c804d08a16c6e6dcf9a817129fcfb1cbf4b8cd6fecf78f5f2
-
SSDEEP
3072:/uGUIY4jWtIHCJXlS2XQBXjhZN0MDJkFX5lgg8b9DeYt/yHB6Wg6f:/+IY4jWPJU2gNjhb04yFXDggClUh6WgO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26f74bd390e23eee78b64b101eb19645
Files
-
26f74bd390e23eee78b64b101eb19645.exe windows:4 windows x86 arch:x86
526ed57ac20d74c74561faacecb8f7c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQueryEx
ReadProcessMemory
GetThreadContext
GetProcAddress
GetModuleHandleA
TerminateProcess
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
VirtualProtectEx
VirtualAlloc
GetTickCount
Sleep
CreateThread
lstrcpyA
FindClose
FindNextFileA
lstrcmpA
FindFirstFileA
lstrcatA
GetSystemDirectoryA
GetTempPathW
WideCharToMultiByte
LocalAlloc
GetModuleFileNameA
GetCurrentProcessId
GetTempPathA
WaitForSingleObject
CreateRemoteThread
SetFileTime
GetFileTime
ExitProcess
GetSystemInfo
VirtualProtect
GetLocaleInfoA
LocalFree
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
OpenProcess
CloseHandle
HeapFree
GetProcessHeap
HeapAlloc
GetFileSize
CreateFileA
GetLastError
DeviceIoControl
ReadFile
lstrlenA
SetFilePointer
WriteFile
lstrcpyW
GetStringTypeW
GetStringTypeA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapSize
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
user32
LoadIconA
wsprintfA
advapi32
BuildExplicitAccessWithNameA
ControlService
OpenSCManagerA
OpenServiceA
CreateServiceA
ChangeServiceConfigA
CloseServiceHandle
DuplicateTokenEx
ImpersonateLoggedOnUser
GetKernelObjectSecurity
GetSecurityDescriptorDacl
GetUserNameA
SetEntriesInAclA
MakeAbsoluteSD
SetSecurityDescriptorDacl
SetKernelObjectSecurity
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteA
shlwapi
SHSetValueA
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ