Static task
static1
Behavioral task
behavioral1
Sample
26f5bbbb86a30018d4760c4676b062b8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26f5bbbb86a30018d4760c4676b062b8.exe
Resource
win10v2004-20231215-en
General
-
Target
26f5bbbb86a30018d4760c4676b062b8
-
Size
584KB
-
MD5
26f5bbbb86a30018d4760c4676b062b8
-
SHA1
210e26805cc2cec46719347e2e4f799d149d1dc3
-
SHA256
b5a5fdd05fc188f42031e2c55522fba6195ae0a2bc737c086ab637638784024a
-
SHA512
1a72e985b330e3ec3be5fd1eb85901c4cdaa6d979c641e7d83f625406fd952b2ceddac0bc1e22c1bd14aefa5f1608541bd7e2ecb54125b78105ee12a45005484
-
SSDEEP
12288:C2UuLkAD3Hg1eUHZ6TI/Wo8wDPEoHG9c2lSvREYWpQm5s:FUuTgoUhjTG9rQb8QOs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26f5bbbb86a30018d4760c4676b062b8
Files
-
26f5bbbb86a30018d4760c4676b062b8.exe windows:4 windows x86 arch:x86
61a015ec498728b2d69d2564f93ec7ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DestroyWindow
SetParent
ShowWindow
GetClipboardData
SetProcessDefaultLayout
IsWindowEnabled
CreateWindowExA
SetWindowsHookA
MessageBoxW
RegisterClassExA
EnableScrollBar
LoadCursorW
EnableWindow
SetCursor
SetScrollPos
VkKeyScanW
DdeSetUserHandle
EnumWindows
TabbedTextOutW
GetPropW
GetOpenClipboardWindow
CreateMDIWindowW
CountClipboardFormats
GetNextDlgTabItem
LockWindowUpdate
DefWindowProcA
DlgDirListW
CascadeChildWindows
RegisterClassA
SetCursorPos
SetScrollInfo
IsCharUpperW
CreateDialogIndirectParamA
CreateDialogIndirectParamW
BringWindowToTop
wininet
FindFirstUrlCacheGroup
CommitUrlCacheEntryW
comctl32
ImageList_Duplicate
ImageList_GetImageCount
ImageList_DragLeave
ImageList_Write
CreatePropertySheetPageA
ImageList_DragMove
InitCommonControlsEx
ImageList_BeginDrag
ImageList_SetDragCursorImage
CreateToolbarEx
ImageList_LoadImageW
ImageList_Draw
DrawStatusText
ImageList_DragShowNolock
ImageList_Destroy
ImageList_ReplaceIcon
CreateStatusWindow
ImageList_DrawEx
kernel32
FreeEnvironmentStringsW
GetStringTypeW
EnterCriticalSection
GetLocalTime
GetCurrentProcessId
HeapFree
InterlockedDecrement
HeapAlloc
GetCPInfo
TlsGetValue
GetFileType
GetStdHandle
WaitForDebugEvent
InitializeCriticalSection
GetCommandLineA
LoadLibraryA
GetTimeZoneInformation
CreateMutexA
ReadFile
MultiByteToWideChar
RtlUnwind
SetLastError
GetEnvironmentStringsW
CloseHandle
GetModuleHandleA
VirtualQuery
GetCurrentThread
QueryPerformanceCounter
GlobalUnfix
GetOEMCP
GetModuleFileNameW
SetHandleCount
TerminateProcess
GetCommandLineW
GetSystemDirectoryW
InterlockedIncrement
GetSystemTimeAsFileTime
CompareStringW
GetCurrentThreadId
WriteFile
LCMapStringW
LeaveCriticalSection
GetVersion
TlsFree
GetSystemTime
UnhandledExceptionFilter
GetModuleFileNameA
SetFilePointer
GetStartupInfoA
CompareStringA
HeapCreate
TlsSetValue
TlsAlloc
FlushFileBuffers
VirtualAlloc
SetEnvironmentVariableA
GetStringTypeA
LocalSize
WideCharToMultiByte
GetStartupInfoW
SetStdHandle
HeapReAlloc
InterlockedExchange
GetCurrentProcess
CreateDirectoryExW
GetLastError
GetEnvironmentStrings
FreeEnvironmentStringsA
GetProfileIntW
HeapDestroy
IsBadWritePtr
VirtualFree
LCMapStringA
OpenMutexA
DeleteCriticalSection
ExitProcess
GetTickCount
GetProcAddress
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ