Static task
static1
Behavioral task
behavioral1
Sample
26d637bb83fdc147d06695f9744236b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26d637bb83fdc147d06695f9744236b2.exe
Resource
win10v2004-20231222-en
General
-
Target
26d637bb83fdc147d06695f9744236b2
-
Size
148KB
-
MD5
26d637bb83fdc147d06695f9744236b2
-
SHA1
c3dfefdea6eb03a1691bdc6c4e6a840d1ecd5515
-
SHA256
38ed949805ce15fe0a87dfdbf0076adde06398d9566da56e7acdfc9bd3b69bbf
-
SHA512
85e1ef78ea400b01d63baf2f7d2f2856087c7d346c3b8f3f18e069de7e6bd98548b3f02f6c6e143162ddf74595a9b031f71926d92346e04f8ecfcdad95e1b7be
-
SSDEEP
3072:+6k8g1KjABmRJzIw5rqpVp0aH43+kiJByfILjn:+J8Acnt5To4OJH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26d637bb83fdc147d06695f9744236b2
Files
-
26d637bb83fdc147d06695f9744236b2.exe windows:4 windows x86 arch:x86
504d56249392f73eb1f78651655222c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DuplicateHandle
GetCurrentProcess
OpenProcess
WriteFile
GetProcAddress
LoadLibraryA
SetFileTime
GetFileAttributesExA
GetVersionExA
GetStartupInfoA
GetModuleHandleA
CloseHandle
GetLastError
CreateFileA
GetModuleFileNameA
GetSystemDirectoryA
Sleep
WinExec
user32
CreateWindowExA
DefWindowProcA
PostQuitMessage
DispatchMessageA
GetDesktopWindow
TranslateMessage
GetMessageA
RegisterClassExA
ShowWindow
advapi32
LookupAccountNameA
OpenSCManagerA
OpenServiceA
DeleteService
CloseServiceHandle
StartServiceA
ConvertSidToStringSidA
GetUserNameA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CreateServiceA
shlwapi
SHDeleteKeyA
SHSetValueA
msvcrt
_exit
_stricmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
rand
fclose
fflush
fwrite
fopen
sprintf
_access
srand
time
??3@YAXPAX@Z
??2@YAPAXI@Z
_except_handler3
_XcptFilter
exit
_acmdln
__getmainargs
dbghelp
ImageNtHeader
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ