?MXxsyhguuhwwo@@UGPAHH@Z
Static task
static1
Behavioral task
behavioral1
Sample
1a00544b7bf89657c048d0952dbcf33c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a00544b7bf89657c048d0952dbcf33c.exe
Resource
win10v2004-20231215-en
General
-
Target
1a00544b7bf89657c048d0952dbcf33c
-
Size
78KB
-
MD5
1a00544b7bf89657c048d0952dbcf33c
-
SHA1
4164eb6b9ddbecab393269a9d842590705d9065a
-
SHA256
dcdae2d6fc06066454a2e21abbccda2a9754bfcbd374017177d9515a411337b1
-
SHA512
c18821a9649b68765163a56514c2023cecfe4d5c9e15da3f0deec7c2a996b845a6843b8f6a9cc607ef99393b1ef8a3d1e915dd55ece1f61515709ab059cf82ec
-
SSDEEP
1536:yvNzeMpdnaBwWO+JGyuhgFG7TnDr9ZeRfBU35n5BlH3iWeMmdCjFwiFe76:8NHaBzduao7TnfzeRfBU3JNH3iT6Fwyx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a00544b7bf89657c048d0952dbcf33c
Files
-
1a00544b7bf89657c048d0952dbcf33c.exe windows:5 windows x86 arch:x86
3355da78202ed630d58f5b2194e255ca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRelativePathToW
StrTrimA
msvcrt
exit
user32
GetMenuItemID
GetMenuItemCount
CallWindowProcA
ShowWindowAsync
LoadCursorW
CharNextW
BeginDeferWindowPos
PostMessageA
GetDlgItemInt
CharUpperBuffA
DrawAnimatedRects
GetShellWindow
SetScrollInfo
DialogBoxParamW
IsCharAlphaNumericW
SystemParametersInfoW
SetWindowLongA
GetDlgItem
LoadBitmapA
MessageBoxA
MessageBoxExA
DrawStateW
IsCharAlphaW
DispatchMessageW
SetRectEmpty
CloseDesktop
BeginPaint
InflateRect
gdi32
CreatePolygonRgn
CreateFontW
CreatePen
SetRectRgn
StretchDIBits
TranslateCharsetInfo
SetWindowOrgEx
Rectangle
WidenPath
SetAbortProc
GetTextFaceW
SetDIBColorTable
GetPixel
kernel32
HeapAlloc
lstrcatW
GetThreadContext
FileTimeToSystemTime
GetTickCount
GetNumberFormatA
GlobalAddAtomW
GetModuleFileNameA
GetModuleHandleA
GetDateFormatA
VirtualProtect
FindNextFileW
PulseEvent
WaitForMultipleObjects
GetComputerNameExA
CreateNamedPipeW
Exports
Exports
Sections
.text Size: 56KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 286B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.img1 Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.img2 Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.img3 Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.img4 Size: 512B - Virtual size: 258B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tsc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ