Static task
static1
Behavioral task
behavioral1
Sample
fb29df411c42ed200a3539f83a0d2bc0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fb29df411c42ed200a3539f83a0d2bc0.exe
Resource
win10v2004-20231222-en
General
-
Target
fb29df411c42ed200a3539f83a0d2bc0
-
Size
147KB
-
MD5
fb29df411c42ed200a3539f83a0d2bc0
-
SHA1
3ed8f8f14e42694e98e9dd4f341a9e5a78b1cf83
-
SHA256
115410b84c37f8485e39846f3ac3f8052530d6558c3d7871c1e2e9479811aaac
-
SHA512
88bf11ea53930dbcc6d74b65c2baa67a33f04cf91ccc6123e9da82f2feb9e320b521356c88212262bd8ae706cc7d89a70593610e38be2edeef06317ab632ef63
-
SSDEEP
1536:BxvKpjlfDwkZTOPLcDvD5L+B64fE4LMp5yiEQ45d2ZGEmIbsaRTb9O+gPor:6zRwSD5LDZYI5r5kdAGErbsaF9rgP+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb29df411c42ed200a3539f83a0d2bc0
Files
-
fb29df411c42ed200a3539f83a0d2bc0.exe windows:5 windows x86 arch:x86
e05a18221df467418a3c02978ba06cc4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetStdHandle
GetVersionExW
ExitProcess
GetUserDefaultUILanguage
GetModuleHandleW
WriteConsoleW
GetStdHandle
GetCommandLineW
HeapAlloc
GetProcessHeap
GetFullPathNameW
HeapFree
GetFileAttributesW
LoadLibraryW
GetProcAddress
CreateFileW
InitializeCriticalSection
GetLastError
DuplicateHandle
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
GetFileType
GetCommandLineA
GetStartupInfoA
CloseHandle
SetHandleCount
DeleteCriticalSection
Sleep
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetLastError
InitializeCriticalSectionAndSpinCount
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
RtlUnwind
LoadLibraryA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
CreateFileA
GetModuleFileNameW
CompareStringA
GetFileSize
FindFirstFileA
FindNextFileA
GetModuleHandleA
shell32
CommandLineToArgvW
user32
FindWindowA
ShowWindow
MessageBoxExW
KillTimer
DestroyMenu
SetWindowLongA
GetMenuItemCount
DestroyWindow
PostQuitMessage
GetWindowLongA
DefWindowProcA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
UnhookWindowsHookEx
GetMenuItemID
CallNextHookEx
SetTimer
shlwapi
PathAppendW
StrCmpW
PathRemoveFileSpecW
msi
ord90
gdi32
SetArcDirection
SelectObject
PolylineTo
CreateBrushIndirect
SetDIBits
ole32
CoTreatAsClass
oleaut32
SafeArrayAllocDescriptor
SafeArrayDestroy
advapi32
RegOverridePredefKey
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ