?qlswu_mjdlsHBEO&EDPAXH@Z
Static task
static1
Behavioral task
behavioral1
Sample
502a9ae487103e0a58af18ef55d6f8f4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
502a9ae487103e0a58af18ef55d6f8f4.exe
Resource
win10v2004-20231215-en
General
-
Target
502a9ae487103e0a58af18ef55d6f8f4
-
Size
187KB
-
MD5
502a9ae487103e0a58af18ef55d6f8f4
-
SHA1
2eae3f24d41f2e46702bad63d081c96d419135e6
-
SHA256
f8afc6a46e7f4bb389cf78ab650a2d7002a643d12822fd25992c62fb0b2485c5
-
SHA512
1b04af9822d736d385e2c66c60a763f2ffb19b9690c6330f79f605937c9f80e5086dc1923722610f3307a23ba5a9f40364fa4a085ae0b1191585e96c100cd3a6
-
SSDEEP
3072:pmZ+Aba3C6DZHdHEEpc136lsWu3xwLMaPpLmA1rl8TzN9aTf0kE3aj7P:pmZ+abAbbGXWYwLRRCTzuL0Vav
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 502a9ae487103e0a58af18ef55d6f8f4
Files
-
502a9ae487103e0a58af18ef55d6f8f4.exe windows:5 windows x86 arch:x86
9fb8b5d1d2e4e8b4624f0e18eaca8779
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
exit
user32
MessageBoxExW
LoadIconW
SetRectEmpty
DefFrameProcW
GetWindowTextA
DrawStateW
ShowWindow
SetWindowTextA
InsertMenuItemW
RegisterHotKey
ClientToScreen
InternalGetWindowText
GetNextDlgGroupItem
SetActiveWindow
DefDlgProcA
IsCharUpperA
SwitchToThisWindow
GetMessageTime
GetMenuStringW
GetWindowTextW
ActivateKeyboardLayout
GetNextDlgTabItem
ExitWindowsEx
GetClassInfoExW
GetMessageExtraInfo
DialogBoxIndirectParamA
CharLowerW
GetScrollPos
gdi32
CreateFontIndirectA
GetWindowOrgEx
CreatePatternBrush
RestoreDC
EndDoc
GetTextMetricsA
GetNearestPaletteIndex
EndPath
GetSystemPaletteUse
GetRgnBox
ExtTextOutA
IntersectClipRect
CreatePolygonRgn
shlwapi
StrNCatA
kernel32
VirtualFree
lstrlenW
CreateWaitableTimerW
GetSystemDirectoryA
FindClose
GetCurrentProcessId
FindResourceW
FindFirstChangeNotificationW
GetThreadContext
GetLocalTime
SetHandleCount
lstrcatA
ExitProcess
SetThreadContext
FindNextFileA
LoadLibraryW
WaitCommEvent
CreateEventA
Exports
Exports
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.itext Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 191B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.debug Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pics Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.picd Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.picc Size: 512B - Virtual size: 385B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.help Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.virt Size: - Virtual size: 309KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ