Static task
static1
Behavioral task
behavioral1
Sample
59bbbebb7b361edbde97d02604b64dbc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59bbbebb7b361edbde97d02604b64dbc.exe
Resource
win10v2004-20231215-en
General
-
Target
59bbbebb7b361edbde97d02604b64dbc
-
Size
392KB
-
MD5
59bbbebb7b361edbde97d02604b64dbc
-
SHA1
a4270e3a205cece0504395de1e727e62fd73432e
-
SHA256
f902b56e8197ece38ade81a844752bb0a4c838425c8fd20e9e958599cf156a7c
-
SHA512
d14d311580be851651ef1638bd115f8c5b147142c05f3a91b7909c6e6c8d2968bcf648c31688845feac5c36c2b6971d548830146f3a86b8cb9ead8023c71c143
-
SSDEEP
6144:elzP41wG0fljKQIZhzc7HVHtf5vuyh+ajZCsuAMXMzFHCD/yr07oAH4rLKk0WNh:eq/ApUvsfRh+ajZCBAMXoUK0VHmKk0Ch
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59bbbebb7b361edbde97d02604b64dbc
Files
-
59bbbebb7b361edbde97d02604b64dbc.exe windows:4 windows x86 arch:x86
44b3054ee0baecb39f0ed7c33c667278
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalUnlock
GetModuleHandleA
SetConsoleCursorInfo
UnmapViewOfFile
FindClose
ReleaseMutex
GlobalFree
ExitThread
CreateMutexA
TlsGetValue
HeapDestroy
GetLastError
FindResourceA
GetEnvironmentVariableA
GetProcessHeap
CreateFileA
GetACP
LoadLibraryExW
HeapCreate
SetLastError
user32
DefWindowProcW
GetDC
GetIconInfo
DrawMenuBar
DispatchMessageA
GetDlgItem
FillRect
CopyRect
GetFocus
CallWindowProcA
CheckRadioButton
IsWindow
DrawEdge
uxtheme
GetThemeSysInt
DrawThemeIcon
DrawThemeText
DrawThemeEdge
GetThemeRect
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ