Static task
static1
Behavioral task
behavioral1
Sample
1f8e0a6010ae59d081dad9e9fdc81fbd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f8e0a6010ae59d081dad9e9fdc81fbd.exe
Resource
win10v2004-20231215-en
General
-
Target
1f8e0a6010ae59d081dad9e9fdc81fbd
-
Size
440KB
-
MD5
1f8e0a6010ae59d081dad9e9fdc81fbd
-
SHA1
bff15fae9e18420156207a37e96da4e66069bcd8
-
SHA256
b2f6b86e587524903543a8bb10a2ad8db805ecdf39067e2ad38dc3ee415aec69
-
SHA512
44d4ab7d6fe9d1a51df50a5a8393505facaa8e8ab1c3537e137acd6a51dfb1cdb71db866bb1bd1f11e960bf9359e8031033edbe3fdeaab7cb04692c0bff5af67
-
SSDEEP
12288:sK/xv00FTHcQji3yPkX6xGFQKfRmavlFGUOz9Rqn8qge:Dv0KTcjFQvavjlOnMl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1f8e0a6010ae59d081dad9e9fdc81fbd
Files
-
1f8e0a6010ae59d081dad9e9fdc81fbd.exe windows:4 windows x86 arch:x86
ed6ad9d05983ae429bb272a8d973aade
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoW
GetCommandLineW
SetEnvironmentVariableA
GetACP
RtlUnwind
HeapSize
FreeLibrary
GetCurrentProcess
GetTimeZoneInformation
VirtualAlloc
SetUnhandledExceptionFilter
MultiByteToWideChar
HeapReAlloc
GetStdHandle
GetComputerNameW
GetStartupInfoW
GetFileType
SetLastError
GetModuleFileNameA
GetLocaleInfoA
HeapDestroy
ExitProcess
GetOEMCP
HeapCreate
InterlockedIncrement
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
GetUserDefaultLCID
GetEnvironmentStringsW
IsValidLocale
QueryPerformanceCounter
LocalLock
TlsGetValue
EnumSystemLocalesA
TlsFree
WriteFile
GetEnvironmentStrings
HeapAlloc
GetStringTypeW
HeapFree
ResumeThread
Sleep
GetCurrentProcessId
FreeEnvironmentStringsW
InitializeCriticalSection
GetVersionExA
UnhandledExceptionFilter
IsValidCodePage
GetDateFormatA
GetProcessHeap
InterlockedDecrement
GetLastError
LeaveCriticalSection
TlsSetValue
CompareStringW
GetCPInfo
GetModuleHandleA
CompareStringA
GetModuleFileNameW
FreeEnvironmentStringsA
OpenFile
TlsAlloc
EnterCriticalSection
DeleteCriticalSection
GetCurrentThread
IsDebuggerPresent
GetProcAddress
GetStartupInfoA
GetStringTypeA
GetCommandLineA
SetConsoleCtrlHandler
InterlockedExchange
LCMapStringA
TerminateProcess
GetTimeFormatA
VirtualQuery
LCMapStringW
WideCharToMultiByte
VirtualFree
SetHandleCount
GetCurrentThreadId
gdi32
CreateHatchBrush
GetNearestColor
SetTextJustification
Polyline
EnumEnhMetaFile
GetRgnBox
SetAbortProc
ResetDCW
GetICMProfileA
GetBkMode
SetWindowOrgEx
FrameRgn
ExtFloodFill
CreateFontW
Polygon
Ellipse
CreateSolidBrush
GetEnhMetaFileHeader
SetPixel
GetCurrentObject
CreateMetaFileA
shell32
ExtractAssociatedIconA
SHGetSettings
ShellExecuteW
FindExecutableW
SHGetInstanceExplorer
SHAddToRecentDocs
ShellExecuteEx
SHGetPathFromIDList
ShellAboutW
SHGetDesktopFolder
RealShellExecuteExW
Sections
.text Size: 149KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 276KB - Virtual size: 301KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ