Static task
static1
Behavioral task
behavioral1
Sample
1cf85f422822bc6e8c47190e4a88b579.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1cf85f422822bc6e8c47190e4a88b579.exe
Resource
win10v2004-20231215-en
General
-
Target
1cf85f422822bc6e8c47190e4a88b579
-
Size
392KB
-
MD5
1cf85f422822bc6e8c47190e4a88b579
-
SHA1
81ac293106fc15ebbef53007861df77af0ae5ab9
-
SHA256
f07780c9f96362b50bb86d12c13a1e43e1e983a7ce9852e9ad9aae6f9af599c9
-
SHA512
c38ccbc505b26392b74333a5876470c2aa2d1e8cea9580531bd88b7803221f16f864b01a81366a7b54a0fc7833a26f2c48aba4e4e34fedb9dd6a26d3249bce59
-
SSDEEP
6144:C+Ib1wG0fljKQIZhzc7HVHtf5vuyh+ajZCsuAMXMzFHCD/yr07oAH48OtWkpN:Chb/ApUvsfRh+ajZCBAMXoUK0VHDgNpN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1cf85f422822bc6e8c47190e4a88b579
Files
-
1cf85f422822bc6e8c47190e4a88b579.exe windows:4 windows x86 arch:x86
d9dae4e62071e9edb382e5e0a0782a7f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
SetConsoleCursorInfo
LocalUnlock
GetEnvironmentVariableA
GetProcessHeap
LoadLibraryExW
HeapDestroy
GetModuleHandleA
TlsGetValue
ExitThread
GetACP
FindClose
CreateMutexA
CreateFileA
UnmapViewOfFile
SetLastError
FindResourceA
GlobalFree
HeapCreate
GetLastError
user32
DefWindowProcW
GetIconInfo
CallWindowProcA
GetDC
FillRect
CheckRadioButton
GetFocus
IsWindow
DrawMenuBar
DispatchMessageA
DrawEdge
GetDlgItem
CopyRect
uxtheme
DrawThemeText
DrawThemeEdge
GetThemeSysInt
DrawThemeIcon
GetThemeRect
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ