Static task
static1
Behavioral task
behavioral1
Sample
1306a1d037607f0768ec82c93312ee28.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1306a1d037607f0768ec82c93312ee28.exe
Resource
win10v2004-20231215-en
General
-
Target
1306a1d037607f0768ec82c93312ee28
-
Size
424KB
-
MD5
1306a1d037607f0768ec82c93312ee28
-
SHA1
6f41c588de9eff9cfc61cc5f862dabf833d8890b
-
SHA256
eddb6933690cfe49dcfad1b4f53376b62ba4316bf8efc46e4cdea756abd398ae
-
SHA512
9d3f37b5e3f0d58094da6cd358d6df40825dcae9348df9db2c3c9f24ef5e945a211da7a87faa6c0af42e828d562acbdcf53d12cb4e9221d317bc31b1aad8ec57
-
SSDEEP
12288:dWNziYgBAV/X/bDoNAJwz+My2ka0ONXdA16060:6ziYga/vbeIwz+tONK4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1306a1d037607f0768ec82c93312ee28
Files
-
1306a1d037607f0768ec82c93312ee28.exe windows:4 windows x86 arch:x86
2c9d1794fa476dcac323c77b0953b014
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetMapMode
GdiPlayDCScript
RoundRect
UnrealizeObject
GetPolyFillMode
GetRandomRgn
GetWinMetaFileBits
CreateBrushIndirect
SetMiterLimit
SaveDC
CreateDCA
GetBkMode
GetSystemPaletteUse
CreatePolyPolygonRgn
GetMetaRgn
SetBitmapDimensionEx
GetCharABCWidthsA
Pie
GetViewportOrgEx
CreateDIBPatternBrush
GetStretchBltMode
GetDIBColorTable
shell32
SHGetFileInfoW
SHGetNewLinkInfo
DragFinish
msvcrt
_ftol
isxdigit
_adj_fdivr_m32
_winmajor
localtime
_CIlog
_wfdopen
__p___initenv
_CIexp
_heapchk
_gmtime64
fputwc
_mbbtype
_adj_fdivr_m64
_mbctohira
_waccess
_sleep
_loaddll
_ismbslead
_wcsnicmp
_CIpow
_unlink
islower
_wctime64
_wmkdir
_ismbcdigit
ole32
OleDuplicateData
StgCreateDocfileOnILockBytes
OleDoAutoConvert
CreateGenericComposite
IsEqualGUID
CoDosDateTimeToFileTime
WriteClassStm
CreateDataAdviseHolder
ReadClassStg
StgIsStorageILockBytes
EnableHookObject
CreateItemMoniker
CoTreatAsClass
kernel32
VirtualAlloc
SetConsoleCursorPosition
ExitProcess
DebugActiveProcess
VirtualFree
SetDefaultCommConfigW
GetModuleHandleA
GetThreadSelectorEntry
GetOverlappedResult
GetNamedPipeHandleStateA
PrepareTape
lstrcmpA
FindFirstFileExA
GetConsoleDisplayMode
MulDiv
ReadConsoleInputExA
EnumCalendarInfoA
LocalAlloc
EnumCalendarInfoW
GetFileInformationByHandle
MapViewOfFile
GetTickCount
CopyFileExW
GetStartupInfoA
FatalAppExitA
RegisterWaitForInputIdle
AssignProcessToJobObject
GetFileTime
lstrlenA
GetSystemTime
GlobalHandle
FreeEnvironmentStringsW
Sleep
GetProcessWorkingSetSize
SystemTimeToFileTime
HeapSize
CreateProcessA
LocalFree
user32
AdjustWindowRect
GetClientRect
DdeFreeStringHandle
CharLowerBuffW
ChildWindowFromPoint
CreatePopupMenu
FlashWindow
DestroyWindow
DrawFocusRect
ChangeClipboardChain
EnumDisplayMonitors
GetClipboardData
CreateDialogIndirectParamA
EnumPropsA
DispatchMessageA
CharNextW
Sections
.text Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.xfsl Size: 237KB - Virtual size: 509KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dncjt Size: 177KB - Virtual size: 447KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ