Static task
static1
Behavioral task
behavioral1
Sample
1a1d3aa095d0f0d2c705b9788a0d85d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a1d3aa095d0f0d2c705b9788a0d85d4.exe
Resource
win10v2004-20231215-en
General
-
Target
1a1d3aa095d0f0d2c705b9788a0d85d4
-
Size
202KB
-
MD5
1a1d3aa095d0f0d2c705b9788a0d85d4
-
SHA1
2e6918b7f1530c607e2739277b6be2dae0a45c3f
-
SHA256
e03b0ae23eabc8529ea1f70839fb3eecf1f8b191722d9c4f59f7759d7a700d25
-
SHA512
ca054a8c473e8df85606dfb7ad381329d1251c3276917e14bedd78a62cd75d52f27869ffdc95b3dc9da6d613ca3f5b48692123e950d68b2fdfac5e04675e6cd7
-
SSDEEP
3072:nqmWUDoSznZkSvUzmXAG7Jy9uKj1NZGqyzXSfJi9xoQxVbxV8210JywzTN1dbX8D:nCmZkScky9u01NZOCfJip/gzJscwBL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a1d3aa095d0f0d2c705b9788a0d85d4
Files
-
1a1d3aa095d0f0d2c705b9788a0d85d4.exe windows:4 windows x86 arch:x86
17a0b52e23052e701c3b6216cfd665ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
Rectangle
GetTextExtentPoint32A
SelectObject
SetBkMode
GetStockObject
SetTextColor
CreateSolidBrush
comdlg32
GetFileTitleA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetFileInfoA
SHGetDesktopFolder
SHGetSpecialFolderLocation
ShellExecuteA
kernel32
FlushFileBuffers
GetFullPathNameA
lstrcatA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
FreeLibrary
GetModuleHandleA
LoadLibraryA
GetProcAddress
SetCurrentDirectoryA
GetTempPathA
lstrcpyA
GetLogicalDrives
GetModuleFileNameA
WideCharToMultiByte
GetLastError
SystemTimeToFileTime
GetSystemTime
CompareFileTime
GetCommandLineA
InitializeCriticalSection
MultiByteToWideChar
lstrlenA
WriteProfileStringA
GetShortPathNameA
CreateDirectoryA
DeleteFileA
GetDiskFreeSpaceA
GetTempFileNameA
CreateFileA
GetStdHandle
ReadFile
WriteFile
CloseHandle
SetEndOfFile
SetFilePointer
GetFileAttributesA
DeviceIoControl
GetVersionExA
SetFileAttributesA
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
FileTimeToDosDateTime
FileTimeToLocalFileTime
SetFileTime
SetVolumeLabelA
FindFirstFileA
FindNextFileA
FindClose
GetVolumeInformationA
GetDriveTypeA
GetLocaleInfoA
HeapFree
RtlUnwind
HeapAlloc
RaiseException
ExitProcess
TerminateProcess
GetTimeZoneInformation
GetLocalTime
MoveFileA
GetStartupInfoA
GetVersion
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
HeapSize
GetCPInfo
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
user32
GetClientRect
SystemParametersInfoA
MapWindowPoints
SetWindowPos
GetWindow
GetWindowLongA
RegisterClassExA
wsprintfA
LoadCursorA
GetParent
IsDlgButtonChecked
GetClassInfoExA
SendMessageA
DialogBoxParamA
SendDlgItemMessageA
DestroyMenu
TrackPopupMenu
SetWindowTextA
EndDialog
DispatchMessageA
GetMessageA
CheckDlgButton
LoadStringA
LoadIconA
UpdateWindow
SetWindowLongA
CreateWindowExA
IsWindow
ClientToScreen
GetWindowTextA
ReleaseCapture
SetCursor
SetCapture
CallWindowProcA
MessageBoxA
IsWindowEnabled
GetSysColor
InvalidateRect
EndPaint
DrawTextA
BeginPaint
DdeConnect
DdeCreateStringHandleA
DdeInitializeA
DdeUninitialize
DdeFreeStringHandle
DdeDisconnect
TranslateMessage
IsDialogMessageA
PeekMessageA
DdeGetLastError
DdeClientTransaction
CharToOemBuffA
OemToCharBuffA
EnableWindow
SetFocus
GetDlgItemTextA
SetDlgItemTextA
PostQuitMessage
DefWindowProcA
GetCursorPos
GetWindowRect
ScreenToClient
ShowWindow
PostMessageA
GetDlgItem
CreatePopupMenu
RegisterClassA
advapi32
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
RegQueryValueA
RegOpenKeyExA
RegSetValueA
RegCreateKeyA
RegEnumKeyExA
ole32
CoUninitialize
CoInitialize
Sections
.text Size: - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pklstb Size: 116KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.relo2 Size: 4KB - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ