Static task
static1
Behavioral task
behavioral1
Sample
01e3a2d6296ea532047ca3f6f95bce3b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
01e3a2d6296ea532047ca3f6f95bce3b.exe
Resource
win10v2004-20231215-en
General
-
Target
01e3a2d6296ea532047ca3f6f95bce3b
-
Size
96KB
-
MD5
01e3a2d6296ea532047ca3f6f95bce3b
-
SHA1
0167a096799db2c4a7c0ec21ef7a6ebf95b1df19
-
SHA256
bfb9b07d8b5253b89fe00b94e8bb7a2f24be07d14e548945aba6fc6fc88e658b
-
SHA512
c8dfae3c9ee300f4039d387940fa55f1877ea1341dd2aa0f70e72caeab1ec0192e351c9f153a280642e35f24a0c02ce653c5ecfcab6910a99d5fd93b2a1e3e94
-
SSDEEP
1536:Pq09rpRP+KqkEYdjM991AWy3rFmiRZicfIe7W0eTuDSpJ9kEo2cf6+Dwpz:PqSRWmdK1Efrib0PSpJKEZ+DM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01e3a2d6296ea532047ca3f6f95bce3b
Files
-
01e3a2d6296ea532047ca3f6f95bce3b.exe windows:4 windows x86 arch:x86
7ea5f576cb5141004bc432e9538697da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetLastError
lstrcpyA
GetFileAttributesA
ReadFile
GetACP
GetModuleFileNameA
LoadResource
GetFullPathNameA
lstrcpynA
FindResourceA
GetCurrentThreadId
SetFilePointer
GetCurrentThread
EnterCriticalSection
lstrlenA
GetLocalTime
FormatMessageA
LocalReAlloc
LoadLibraryExA
VirtualFree
lstrcmpiA
FindFirstFileA
HeapAlloc
GetUserDefaultLCID
InitializeCriticalSection
LocalAlloc
HeapDestroy
FindClose
lstrcatA
GetVersionExA
RaiseException
VirtualAlloc
LocalFree
GetStringTypeA
GetVersion
VirtualAllocEx
SizeofResource
GetProcessHeap
ExitThread
GetStringTypeW
GetEnvironmentStrings
SetErrorMode
ExitProcess
GetLocaleInfoA
GlobalFindAtomA
LockResource
GlobalAlloc
GetDiskFreeSpaceA
GetFileType
FreeLibrary
GetTickCount
GetDateFormatA
CompareStringA
MoveFileA
MulDiv
user32
GetMenuItemID
DeferWindowPos
FrameRect
CreateIcon
GetDesktopWindow
EnableWindow
TrackPopupMenu
DefWindowProcA
SetWindowTextA
ShowScrollBar
DrawIcon
GetDC
EndPaint
GetActiveWindow
CallWindowProcA
GetSysColor
SetCursor
CreatePopupMenu
GetClassInfoA
GetMessagePos
GetScrollInfo
GetCursor
GetSysColorBrush
GetPropA
EqualRect
GetWindowTextA
CallNextHookEx
GetDCEx
IsMenu
DrawFrameControl
CharLowerA
SystemParametersInfoA
GetMenu
EnableMenuItem
IsWindowEnabled
FillRect
DefMDIChildProcA
CharToOemA
EnumChildWindows
GetMenuItemCount
EnumThreadWindows
GetScrollPos
GetSubMenu
DefFrameProcA
GetKeyNameTextA
DispatchMessageW
GetLastActivePopup
IsDialogMessageA
GetWindow
GetFocus
MessageBoxA
DrawMenuBar
GetKeyState
GetCursorPos
IsWindowVisible
DrawEdge
BeginPaint
GetCapture
GetClassLongA
GetScrollRange
EnumWindows
CharLowerBuffA
FindWindowA
CreateMenu
BeginDeferWindowPos
HideCaret
ClientToScreen
DrawTextA
CreateWindowExA
GetClientRect
GetForegroundWindow
RegisterClassA
EndDeferWindowPos
CheckMenuItem
GetMenuStringA
GetDlgItem
IsChild
EnableScrollBar
CharNextA
SetWindowPos
msvcrt
memmove
exit
mbstowcs
srand
time
memset
atol
wcsncmp
wcscspn
sprintf
wcstol
_acmdln
calloc
clock
wcschr
sqrt
memcpy
tolower
rand
malloc
swprintf
oleaut32
OleLoadPicture
SysStringLen
SysAllocStringLen
VariantChangeType
SafeArrayGetElement
Sections
.init Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 211B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 3B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 571B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ