Static task
static1
Behavioral task
behavioral1
Sample
1e628f2f23d3c946e288973e2361f97e.exe
Resource
win7-20231129-en
General
-
Target
1e628f2f23d3c946e288973e2361f97e
-
Size
41KB
-
MD5
1e628f2f23d3c946e288973e2361f97e
-
SHA1
73372b9bf2c3c95462c9b75223b09305833ee2b6
-
SHA256
298b1ca77a656df5f2a9a59bbf547faa777e6512f80b639a75198f78e6cc8ee3
-
SHA512
5f276c9a4a44c380e7d024220e62edf5ec08706244823400f274ffb8cda560d6df38ae51144cc2983fc30e5baf7974e2d31548985a2fd7bcfda269a1f04ad1b5
-
SSDEEP
768:3NCXyjnWuQ9F67C6NuJzaAydD8J7hL5XqIyL1dt5nxRMCF5GncAbKrSRT:9CXInfikQeAqq9YnL1d3nxRrI1bKrk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e628f2f23d3c946e288973e2361f97e
Files
-
1e628f2f23d3c946e288973e2361f97e.exe windows:4 windows x86 arch:x86
29de825170f1adc43324ad8863ab7746
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
SetFileSecurityA
CryptGenKey
LsaOpenAccount
ElfClearEventLogFileW
CreatePrivateObjectSecurity
CryptReleaseContext
CryptGetKeyParam
QueryServiceConfigW
GetTrusteeNameA
BuildTrusteeWithSidA
NotifyChangeEventLog
RegEnumKeyExW
GetTrusteeTypeW
CryptDeriveKey
InitializeAcl
BuildImpersonateTrusteeA
msvcrt
_inp
_getmaxstdio
iswspace
cos
calloc
_outpw
_wsopen
_fullpath
_gcvt
_loaddll
__initenv
cosh
strrchr
_putenv
strcpy
__badioinfo
setlocale
_yn
_Strftime
labs
gdi32
CreateSolidBrush
GetStretchBltMode
GetTextExtentPointW
GetCurrentObject
gdiPlaySpoolStream
StretchDIBits
GetViewportOrgEx
CreateMetaFileA
PolyBezier
EnumICMProfilesA
DeleteEnhMetaFile
SetStretchBltMode
GetCharWidthW
GetBoundsRect
OffsetRgn
CreateFontA
GetRandomRgn
CreateColorSpaceA
GetGraphicsMode
ModifyWorldTransform
GetDeviceCaps
SelectObject
CreateICA
StartPage
MaskBlt
GdiComment
CopyMetaFileA
GetMapMode
comdlg32
GetSaveFileNameA
kernel32
GetTickCount
QueryDosDeviceA
GetModuleHandleW
lstrcmpiW
GetModuleHandleA
VirtualFree
OutputDebugStringW
GetStartupInfoW
VirtualAllocEx
GetProfileSectionW
DisconnectNamedPipe
VirtualProtectEx
SearchPathA
SetEnvironmentVariableW
GetPrivateProfileSectionNamesW
GlobalMemoryStatus
FreeEnvironmentStringsA
CreateMailslotA
CallNamedPipeW
HeapWalk
GetComputerNameA
MoveFileExA
GetCommandLineA
GetModuleFileNameW
Sleep
MoveFileWithProgressA
EnumResourceLanguagesA
ExitProcess
LockFileEx
GlobalGetAtomNameW
FindNextFileA
ReadFileEx
GetDriveTypeA
VirtualAlloc
CreateMailslotW
SetFileAttributesA
EnumResourceTypesW
ReadConsoleOutputCharacterW
CreateThread
GetStartupInfoA
GetConsoleScreenBufferInfo
VirtualFree
RtlMoveMemory
user32
ChangeMenuW
CreateIcon
DdeInitializeA
DestroyAcceleratorTable
GetDlgCtrlID
DrawTextExA
GetGUIThreadInfo
EnumWindowStationsA
DestroyCaret
CountClipboardFormats
GetClientRect
ole32
CoTaskMemRealloc
ProgIDFromCLSID
RegisterDragDrop
CLSIDFromProgID
CreateBindCtx
OleCreateStaticFromData
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.mjxh Size: 18KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.eget Size: 11KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mdwqc Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 743B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ