Static task
static1
Behavioral task
behavioral1
Sample
1fe1b0595a0b7833cb9ab8206984e704.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fe1b0595a0b7833cb9ab8206984e704.exe
Resource
win10v2004-20231222-en
General
-
Target
1fe1b0595a0b7833cb9ab8206984e704
-
Size
429KB
-
MD5
1fe1b0595a0b7833cb9ab8206984e704
-
SHA1
68adf17af5ba3fbfaff85772e9c5d1efa14c2c58
-
SHA256
e1d76f02c2a4c3e28f7a57e071d469151b1ad8c48c434af1c4ea38edd5b9a8c5
-
SHA512
27331d9a1b6278342fc60b1900a28d18b98f7bb16c7e848543ee4ba08fac3f4ecdf50b990f716cbca0e1f2146c837c720347a6ea67a827eeeac17339e6629924
-
SSDEEP
12288:LtUWaTNVWTWRrrueyeNJQjpVoJusKsRUAG:LtUbsPGwzsumG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1fe1b0595a0b7833cb9ab8206984e704
Files
-
1fe1b0595a0b7833cb9ab8206984e704.exe windows:5 windows x86 arch:x86
e437e6883a2f598fc81ede7adc59035f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
QueryPerformanceCounter
GetFileTime
FormatMessageW
InterlockedIncrement
LZDone
SetCurrentDirectoryW
GetACP
user32
FindWindowW
GetWindowTextA
PeekMessageW
TranslateMessage
EnableWindow
gdi32
BitBlt
GetDIBits
ResetDCW
PlayEnhMetaFile
DeleteEnhMetaFile
GetEnhMetaFileHeader
GetEnhMetaFileW
EndPage
StartPage
EndDoc
StartDocW
RealizePalette
StretchBlt
SelectPalette
CreateHalftonePalette
GetDIBColorTable
SelectObject
SetBitmapBits
CreateBitmap
CreateCompatibleDC
GetObjectW
DeleteObject
GetDeviceCaps
GetBkColor
msimg32
TransparentBlt
shlwapi
PathAddBackslashW
PathFindExtensionW
PathRemoveFileSpecW
PathCompactPathExW
PathRemoveExtensionW
Sections
.text Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 176KB - Virtual size: 470KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ