Static task
static1
Behavioral task
behavioral1
Sample
1fb17eb8ebd9d04991617bcd98fd63b0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fb17eb8ebd9d04991617bcd98fd63b0.exe
Resource
win10v2004-20231215-en
General
-
Target
1fb17eb8ebd9d04991617bcd98fd63b0
-
Size
52KB
-
MD5
1fb17eb8ebd9d04991617bcd98fd63b0
-
SHA1
fa6abb722d6ebea06cd57f0445983f7a8a4e85f8
-
SHA256
de34150aad887d0bd89b7b42d35f634c00063318cca2029331c0ece5d5743e78
-
SHA512
8e9ae51722b037aa896a1fe876825e4b59d2fc8cf937b9fc6be0eabdde31c3a8e644faf078d3ddff50b71750b86407bd4d792e9436f62d17b1e7310e5f524268
-
SSDEEP
768:qIg/5hgD7SVSLOG+RGYpAOpe1+Ay9563/QKwVM7FE5Hi1:0gDekT+gkA+e1/yq/QrV0WC1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1fb17eb8ebd9d04991617bcd98fd63b0
Files
-
1fb17eb8ebd9d04991617bcd98fd63b0.exe windows:4 windows x86 arch:x86
d0af04a0598adef61830df4fb2f9c041
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasEnumDevicesA
RasEnumEntriesA
RasGetEntryDialParamsA
RasGetEntryPropertiesA
RasEnumConnectionsA
RasSetEntryPropertiesA
RasDialA
RasHangUpA
RasDeleteEntryA
RasGetConnectStatusA
RasSetEntryDialParamsA
mfc42
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord2976
ord3830
ord3831
ord3825
ord3079
ord3749
ord4627
ord4425
ord3597
ord2623
ord2625
ord324
ord4234
ord6197
ord6377
ord6215
ord2486
ord3237
ord2764
ord539
ord1601
ord537
ord1572
ord1113
ord3258
ord668
ord2822
ord858
ord3310
ord2781
ord2820
ord3811
ord2770
ord356
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord5265
ord641
ord823
ord825
ord540
ord860
ord4202
ord6283
ord800
ord4080
msvcrt
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_onexit
__dllonexit
malloc
strcmp
_mbsrchr
time
srand
rand
fwrite
memcmp
_purecall
memset
strncpy
strstr
atoi
getenv
strcpy
_findfirst
_findnext
_findclose
strlen
_EH_prolog
__CxxFrameHandler
sprintf
fopen
fgets
_mbscmp
fclose
??1type_info@@UAE@XZ
_stricmp
_CxxThrowException
kernel32
LocalFree
GetStartupInfoA
SleepEx
CreateProcessA
GetModuleFileNameA
CopyFileA
GetVersionExA
ResumeThread
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
CloseHandle
WriteFile
lstrlenA
lstrcpyA
GetShortPathNameA
CreateFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcessId
TerminateProcess
OpenProcess
HeapAlloc
HeapFree
GetProcessHeap
Sleep
GetModuleHandleA
DeleteFileA
user32
DefWindowProcA
PostQuitMessage
UnregisterClassA
DispatchMessageA
TranslateMessage
GetMessageA
DestroyWindow
ShowOwnedPopups
EnableWindow
wsprintfA
ShowWindow
CreateWindowExA
GetDesktopWindow
EnumChildWindows
GetClassNameA
SendMessageA
RegisterClassExA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoCreateInstance
CoInitialize
OleRun
oleaut32
VariantClear
GetErrorInfo
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ