Static task
static1
Behavioral task
behavioral1
Sample
1567394006c187edff63c00ee6ff3e1a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1567394006c187edff63c00ee6ff3e1a.exe
Resource
win10v2004-20231215-en
General
-
Target
1567394006c187edff63c00ee6ff3e1a
-
Size
116KB
-
MD5
1567394006c187edff63c00ee6ff3e1a
-
SHA1
219f8fd2a1e793a930256e7da615b2cc08a27529
-
SHA256
262b2f30df04a829c21154d4c83261b6d56aa6d46b7a44b0307e3082e83de993
-
SHA512
70355a2aca2bfece00e7f3cd15a259ca52cf31d3f1dda89d82eacc2f3f07becd203679038137bdfd1a58b87340b6aa11d0a8f7e50d56cbf68ce031cbb4909514
-
SSDEEP
3072:UhZ11lQTpC6rTCFUMkUSCdOlrE7Fb2mUNS:2ZpQTIC6dJ7d2y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1567394006c187edff63c00ee6ff3e1a
Files
-
1567394006c187edff63c00ee6ff3e1a.exe windows:4 windows x86 arch:x86
acbd455787624f0dc3b843383c17235b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MoveWindow
GetWindowThreadProcessId
GetIconInfo
DrawEdge
EnableWindow
IsZoomed
CreateIcon
OpenClipboard
CharNextA
GetSystemMenu
SetScrollPos
IsDialogMessageA
RemovePropA
GetKeyState
GetKeyNameTextA
RegisterClipboardFormatA
CreateMenu
RemoveMenu
MsgWaitForMultipleObjects
SetMenu
GetScrollInfo
FillRect
WaitMessage
ChildWindowFromPoint
TrackPopupMenu
BeginPaint
GetMenuItemCount
GetSubMenu
CharUpperBuffA
DrawAnimatedRects
GetWindowTextA
ShowWindow
GetScrollPos
GetClipboardData
GetSysColorBrush
GetClassInfoA
GetDlgItem
CloseClipboard
GetTopWindow
DrawIcon
GetMenuItemInfoA
GetClassLongA
DrawIconEx
GetMenu
InvalidateRect
SendMessageW
EndPaint
MessageBoxA
FindWindowA
RegisterClassA
ReleaseCapture
GetCursor
GetWindowLongA
DefWindowProcA
GetScrollRange
GetDesktopWindow
RegisterWindowMessageA
GetLastActivePopup
SystemParametersInfoA
EnumThreadWindows
SetScrollInfo
GetMenuStringA
SetClipboardData
EmptyClipboard
GetFocus
DrawMenuBar
GetParent
GetCapture
GetMenuState
SetCapture
UnhookWindowsHookEx
AdjustWindowRectEx
IsWindowUnicode
SetScrollRange
EnableScrollBar
IsRectEmpty
WindowFromPoint
PeekMessageW
UpdateWindow
ClientToScreen
GetWindowLongW
IsWindowVisible
OemToCharA
GetDCEx
LoadIconA
DestroyCursor
ReleaseDC
SetCursor
CallNextHookEx
SetRect
GetWindowPlacement
GetDC
SetWindowLongW
GetKeyboardLayoutList
FrameRect
EnableMenuItem
shell32
SHGetFileInfoA
Shell_NotifyIconA
SHGetFolderPathA
SHFileOperationA
comctl32
ImageList_DrawEx
ImageList_Write
version
VerInstallFileA
VerQueryValueA
VerFindFileA
kernel32
DeleteFileA
CompareStringA
VirtualAlloc
GetModuleHandleA
GetOEMCP
HeapAlloc
GetStringTypeW
ExitProcess
GetLocaleInfoA
GetStringTypeA
GetProcAddress
VirtualAllocEx
GetVersionExA
HeapFree
LocalAlloc
GetModuleFileNameA
ReadFile
ExitThread
comdlg32
ChooseColorA
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
gdi32
SelectObject
GetPixel
Sections
CODE Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 512B - Virtual size: 246B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE