Static task
static1
Behavioral task
behavioral1
Sample
a436eacc97175ee5e895bc5da12c9e38.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a436eacc97175ee5e895bc5da12c9e38.exe
Resource
win10v2004-20240221-en
General
-
Target
a436eacc97175ee5e895bc5da12c9e38
-
Size
64KB
-
MD5
a436eacc97175ee5e895bc5da12c9e38
-
SHA1
fcd8c0175bed6a594e2c84d4663168fe728570e0
-
SHA256
cb8a1972d886358d636dfeab7006f567bb36f60e83e6750ed915cd30ef0a318c
-
SHA512
ec3ead550455c4704055446c7d9c1c49cb675908cf7a1c412a9eba1f676c459f4968a438641ca277b7a874540b177ed09a12935763f169d4de08817b5b9179b8
-
SSDEEP
768:t8MOnY7ezXkr44QHilRsAz2vr4nwTmAX0JkeDVMk9gsHH/oUxTG/rEZ42P+soipq:t5mUPafE/dV99VH/L5WA2jCrDZ/pR/K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a436eacc97175ee5e895bc5da12c9e38
Files
-
a436eacc97175ee5e895bc5da12c9e38.exe windows:4 windows x86 arch:x86
ecb334df35fec87d990ba54ed94fd0e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleCreateStaticFromData
CoCreateGuid
gdi32
CreateCompatibleBitmap
LineTo
GetDCOrgEx
RestoreDC
GetPixel
SelectObject
CreateBitmap
SetPixel
GetDIBColorTable
user32
CallNextHookEx
IsIconic
GetWindowRect
comctl32
ImageList_Write
ImageList_Remove
ImageList_DrawEx
ImageList_Create
ImageList_Draw
ImageList_Read
kernel32
InitializeCriticalSection
GetLastError
WaitForSingleObject
SizeofResource
LoadLibraryA
lstrlenW
GetProcAddress
ExitThread
ResetEvent
FindClose
VirtualAlloc
GetModuleHandleA
GetFileAttributesA
lstrlenA
GlobalDeleteAtom
GetCurrentProcess
ExitProcess
GetOEMCP
GetCommandLineA
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ