Static task
static1
Behavioral task
behavioral1
Sample
1dc38be5e74a0a797cdd4106a5fe2b66.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1dc38be5e74a0a797cdd4106a5fe2b66.exe
Resource
win10v2004-20231215-en
General
-
Target
1dc38be5e74a0a797cdd4106a5fe2b66
-
Size
463KB
-
MD5
1dc38be5e74a0a797cdd4106a5fe2b66
-
SHA1
d06e3f5c8a5f74b0a8f287f1eeb7657159c084fe
-
SHA256
5e8da807347978f07fc4c06366e4c657b96997befa23bca49f15bcc40b41b250
-
SHA512
5934550e90363c7fccce5ae947d0fc5a8694241ee344e11551674dda8a2f14180a0045ec05cbb4d6c160f5dc5e74f317b20c8dad9779a3e06a477d87bb71f4fb
-
SSDEEP
6144:wYm3inKggD/e7dg7eUPNRl2pHicmxAFCQ/lbOiA0GZE1E/z0Fmr1w:wN3inKBD4w7PNL2sc5IQ/laiZKLkSy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1dc38be5e74a0a797cdd4106a5fe2b66
Files
-
1dc38be5e74a0a797cdd4106a5fe2b66.exe windows:4 windows x86 arch:x86
e45a9606114498a9c0f534f79467fe81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AllocConsole
GetStdHandle
GlobalAddAtomW
GetLocaleInfoW
GetEnvironmentStringsW
WaitForMultipleObjects
HeapAlloc
WriteFile
TlsAlloc
IsValidLocale
TlsSetValue
CompareStringW
TransactNamedPipe
GetCalendarInfoA
SetHandleCount
SetLastError
FindAtomA
GetLocaleInfoA
GetOEMCP
GlobalReAlloc
MultiByteToWideChar
EnumSystemLocalesA
GetStartupInfoA
FreeEnvironmentStringsA
GetProcessAffinityMask
GetSystemInfo
TlsGetValue
GetLastError
GetProcAddress
FindAtomW
GetFileType
VirtualProtect
GetExitCodeThread
EnterCriticalSection
GetDiskFreeSpaceExW
GetTimeFormatA
VirtualQuery
IsValidCodePage
VirtualFree
LCMapStringW
GetAtomNameA
GetUserDefaultLCID
TlsFree
GetEnvironmentStrings
HeapReAlloc
IsBadWritePtr
ExitProcess
MapViewOfFileEx
SetComputerNameW
VirtualAlloc
WideCharToMultiByte
QueryPerformanceCounter
GetCurrentProcess
HeapDestroy
GetModuleHandleA
GetCPInfo
GetVersionExA
HeapCreate
GetCurrentThreadId
LeaveCriticalSection
UnhandledExceptionFilter
DeleteCriticalSection
GetCommandLineA
GetCurrentProcessId
GetModuleFileNameA
HeapSize
CompareStringA
FindResourceW
GetTickCount
GetStringTypeW
EnumCalendarInfoW
GetACP
SetEnvironmentVariableA
LCMapStringA
RtlUnwind
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
InterlockedExchange
InitializeCriticalSection
DeleteFileA
GetDateFormatA
GetCurrentThread
FindResourceA
GetStringTypeA
GetTimeZoneInformation
HeapFree
TerminateProcess
LoadLibraryA
gdi32
CreateFontA
SetMapMode
OffsetClipRgn
SetBkMode
CreateColorSpaceA
CreateCompatibleBitmap
GetCharWidth32A
PaintRgn
TextOutA
GdiPlayJournal
PolyPolyline
RealizePalette
user32
EndTask
GetShellWindow
DdeDisconnectList
NotifyWinEvent
PeekMessageW
FindWindowA
GetScrollPos
RegisterWindowMessageA
SetDebugErrorLevel
CallMsgFilterA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
ChooseFontA
FindTextW
ReplaceTextW
Sections
.text Size: 171KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 275KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ