Static task
static1
Behavioral task
behavioral1
Sample
04bfecc70aa0f6a65e0156174960d053.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04bfecc70aa0f6a65e0156174960d053.exe
Resource
win10v2004-20231215-en
General
-
Target
04bfecc70aa0f6a65e0156174960d053
-
Size
44KB
-
MD5
04bfecc70aa0f6a65e0156174960d053
-
SHA1
6026a83dcac5a1c2a81f5c0e7d5cc3c875051e8c
-
SHA256
59441b0a1c090624509fbcc547b6fb29178cb637b6b031eb3cea88b65d694527
-
SHA512
d8be07da78efc4479e4fcd4d6c9c1a12ad9dbfa5754f31423adbdbbd4932cd7a833e673777fb0d386a9da60c8b8df31ce4910ad8b97c3eb7df348e7ec8950fd1
-
SSDEEP
768:YGt5uFfOiaHP/CFIAwuQ1NY0ZuN7yp87P9Pg/A9:YtNcCbwuWkJrP6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04bfecc70aa0f6a65e0156174960d053
Files
-
04bfecc70aa0f6a65e0156174960d053.exe windows:4 windows x86 arch:x86
9618928141355d2afe388d9494656830
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
VirtualProtect
FindResourceExA
SetTapeParameters
GetComputerNameA
GetProcessTimes
GetThreadPriorityBoost
CreateConsoleScreenBuffer
ReadConsoleInputExW
ReadConsoleOutputCharacterW
GetTempPathW
GetConsoleWindow
DefineDosDeviceA
GlobalReAlloc
Heap32Next
CreateTimerQueue
SetupComm
EndUpdateResourceA
DeleteVolumeMountPointW
DeleteFileW
SetConsoleCursor
GetShortPathNameW
LocalHandle
EnumCalendarInfoW
ReadProcessMemory
GetConsoleDisplayMode
DeleteTimerQueueTimer
CreateSemaphoreW
EnumTimeFormatsW
GetCurrencyFormatA
AddAtomW
SetConsoleDisplayMode
CompareStringW
FindResourceA
EnumSystemCodePagesW
CancelIo
PostQueuedCompletionStatus
FlushConsoleInputBuffer
RegisterWaitForInputIdle
CreateTapePartition
user32
LoadBitmapA
OpenDesktopW
MapVirtualKeyExA
GetGUIThreadInfo
DefMDIChildProcA
CharLowerW
MessageBoxExA
SetMenuItemInfoA
GetMenuStringW
IsRectEmpty
CreateIconFromResource
LookupIconIdFromDirectory
EnumDesktopWindows
DdeFreeDataHandle
InvertRect
EnumChildWindows
ValidateRect
GetCursor
DestroyCaret
RegisterShellHookWindow
DdeQueryStringW
ClientThreadSetup
GetDlgItemInt
DdePostAdvise
ScrollDC
SetClipboardData
wvsprintfA
MapVirtualKeyExW
LoadStringW
ShowWindowAsync
TranslateAcceleratorA
SetDlgItemInt
LoadCursorFromFileA
IsClipboardFormatAvailable
TabbedTextOutA
InflateRect
EndDeferWindowPos
LoadKeyboardLayoutEx
SetMessageExtraInfo
LoadAcceleratorsW
ToAscii
gdi32
GetMetaFileBitsEx
SetLayoutWidth
RemoveFontResourceExW
ResetDCA
GetSystemPaletteUse
EngUnlockSurface
EndPath
CreateEllipticRgnIndirect
GdiCleanCacheDC
AddFontResourceW
CreateRectRgn
DPtoLP
EngGetDriverName
GetCharWidth32A
ModifyWorldTransform
GetRgnBox
DrawEscape
GdiConvertFont
GetPath
EnumICMProfilesA
GdiProcessSetup
SetColorAdjustment
PlayMetaFile
BRUSHOBJ_ulGetBrushColor
GdiConvertAndCheckDC
CLIPOBJ_bEnum
GetEUDCTimeStamp
FrameRgn
GdiEntry14
GetEnhMetaFileHeader
GdiConvertBrush
CreateDIBPatternBrush
GetStringBitmapA
StretchDIBits
CreateFontA
Chord
GetICMProfileW
EudcLoadLinkW
CopyEnhMetaFileW
CreateCompatibleDC
GdiTransparentBlt
SelectPalette
GetTextCharset
GetRasterizerCaps
comdlg32
PrintDlgExW
Ssync_ANSI_UNICODE_Struct_For_WOW
FindTextW
CommDlgExtendedError
dwLBSubclass
GetSaveFileNameW
GetOpenFileNameW
psapi
QueryWorkingSet
GetMappedFileNameW
GetDeviceDriverBaseNameA
GetMappedFileNameA
GetDeviceDriverFileNameW
GetDeviceDriverFileNameA
EnumProcessModules
InitializeProcessForWsWatch
GetModuleInformation
GetProcessMemoryInfo
EnumProcesses
GetDeviceDriverBaseNameW
GetWsChanges
EnumDeviceDrivers
GetModuleFileNameExA
GetModuleBaseNameW
EmptyWorkingSet
GetModuleFileNameExW
comctl32
ImageList_BeginDrag
ImageList_DragEnter
ImageList_Create
DestroyPropertySheetPage
InitializeFlatSB
InitCommonControlsEx
ImageList_DrawIndirect
ImageList_GetDragImage
PropertySheetW
ImageList_Write
CreateStatusWindow
CreateMappedBitmap
CreateToolbarEx
Sections
.text Size: 4KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE