R:\gpUUcUpihJj\tVhtFYAPM\bpHbphqzxxuzvz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a1b29aab97ffacf4b7d1a20e693d0543.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1b29aab97ffacf4b7d1a20e693d0543.exe
Resource
win10v2004-20240221-en
General
-
Target
a1b29aab97ffacf4b7d1a20e693d0543
-
Size
165KB
-
MD5
a1b29aab97ffacf4b7d1a20e693d0543
-
SHA1
91865b64fc8c880f7bcd11ace864315fe60b5b19
-
SHA256
3bad0028a0489f6a0dfee81e49be7bd39ad44cfd8ba233ae9ab32e6bd3510275
-
SHA512
0ef73c3efe56416251189f25d08697e3bd7c104544b2148d30de5176b12e15c7e86e79034e2197aab2e103f7a5160dfd0719a78576d5a04220f1bd2b30a89d1c
-
SSDEEP
3072:IEaEEQUBBDL7atKrkpaNfL9vNvav/FyqRKUtfEEPNnywrtYXOtCYO0SmGNjcul:LoBH7awrkcfLFNS3FzKUV3/xgCqH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1b29aab97ffacf4b7d1a20e693d0543
Files
-
a1b29aab97ffacf4b7d1a20e693d0543.exe windows:5 windows x86 arch:x86
dc2f904e64bedc3b055b56af52e3c955
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
IsWindowEnabled
GetClientRect
GetForegroundWindow
SetFocus
OffsetRect
AdjustWindowRect
IsWindow
GetTopWindow
kernel32
GetCompressedFileSizeW
GetFileType
HeapReAlloc
GetVersionExA
GetSystemWindowsDirectoryW
GetShortPathNameW
ReleaseSemaphore
MoveFileA
GetSystemDirectoryW
UnmapViewOfFile
DisconnectNamedPipe
GetCurrentThreadId
CompareFileTime
SetTimerQueueTimer
ntdll
RtlCompareMemory
Exports
Exports
?InsertFil
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fxc Size: - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fx Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ