Static task
static1
Behavioral task
behavioral1
Sample
a9bc42698e0d38d771e0c01598546435.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9bc42698e0d38d771e0c01598546435.exe
Resource
win10v2004-20240226-en
General
-
Target
a9bc42698e0d38d771e0c01598546435
-
Size
57KB
-
MD5
a9bc42698e0d38d771e0c01598546435
-
SHA1
1a8661b0e07935abcea23a5cf2609b66716c2db1
-
SHA256
2b4658e6df1682ffd76a0a32e8e8c714558215a8c1335c12a13f77f714c80d68
-
SHA512
5df7f20a824c58820bc050aa45b35fef6b084f770f9c2b85baf97ee4036a194f9b49154564367b085ad603c50a2aff0f94b414e1082ab467c636150133fafe11
-
SSDEEP
768:jLDKd2Fd0GtNb710D6jCQoscfD90wCJ7DeIpJ9H6UeTsumRDwGzoi6KAZSd:jHK5Gf3AQrIFCt9neT1mRMGcbKO6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9bc42698e0d38d771e0c01598546435
Files
-
a9bc42698e0d38d771e0c01598546435.exe windows:4 windows x86 arch:x86
ecc80a06c7d39ed9813b4a9d9ff99c1e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CancelDC
AbortPath
CloseFigure
GetCurrentPositionEx
DeleteDC
GetBitmapBits
DeleteObject
CloseMetaFile
GetBrushOrgEx
RestoreDC
GetPixel
CreateSolidBrush
GetDCOrgEx
ClearBrushAttributes
ExtTextOutA
SetTextColor
AddFontResourceA
BeginPath
AddFontResourceExA
AddFontResourceTracking
AddFontResourceExW
ExcludeClipRect
BitBlt
ClearBrushAttributes
DeleteDC
CancelDC
CloseFigure
ExtTextOutA
BeginPath
AddFontResourceA
GetPixel
GetCurrentPositionEx
GetBitmapBits
CloseMetaFile
GetClipBox
CreateSolidBrush
AddFontResourceExW
AbortPath
ExcludeClipRect
BitBlt
GetPixel
CopyMetaFileA
AddFontResourceExA
GetDCOrgEx
GetBrushOrgEx
comctl32
ImageList_Create
ImageList_GetDragImage
ImageList_DragLeave
ImageList_Merge
ImageList_BeginDrag
ImageList_DragShowNolock
ImageList_GetImageInfo
ImageList_GetImageCount
ImageList_LoadImageW
ImageList_Replace
ImageList_DragEnter
ImageList_LoadImage
ImageList_DrawIndirect
ImageList_AddIcon
ImageList_Remove
ImageList_DragMove
ImageList_BeginDrag
ImageList_DragMove
ImageList_Copy
ImageList_GetDragImage
ImageList_Merge
ImageList_DragEnter
ImageList_Draw
ImageList_DrawEx
InitCommonControls
ImageList_Read
ImageList_LoadImageA
ImageList_GetImageCount
ImageList_Replace
ImageList_GetIconSize
ImageList_Remove
ImageList_LoadImageW
ImageList_ReplaceIcon
ImageList_DragShowNolock
ImageList_GetImageInfo
ImageList_EndDrag
ImageList_DragLeave
ImageList_Create
ImageList_DrawIndirect
ImageList_LoadImage
shell32
DragQueryPoint
ExtractIconEx
SHFindFiles
PathGetShortPath
FreeIconList
CommandLineToArgvW
DragQueryFileW
SHChangeNotifyRegister
FindExeDlgProc
CheckEscapesA
ShellAboutA
DragAcceptFiles
ExtractIconResInfoA
DragQueryFileA
SHUpdateImageW
ExtractIconA
CheckEscapesA
SHDefExtractIconA
DragQueryFileA
PathGetShortPath
DragFinish
ExtractIconExA
DragQueryFile
DragQueryFileW
DragAcceptFiles
FindExeDlgProc
FreeIconList
SHChangeNotifyRegister
SHUpdateImageA
DragQueryFileAorW
SHDoDragDrop
advapi32
RegDeleteValueW
RegEnumValueW
RegQueryInfoKeyA
RegEnumKeyExW
RegEnumKeyExA
RegCreateKeyExW
RegDeleteKeyA
RegQueryValueA
RegOpenKeyExW
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyW
RegLoadKeyA
RegQueryValueExW
RegEnumKeyW
RegDeleteValueA
kernel32
CopyFileA
GlobalFree
GetCommandLineA
OpenFile
CopyFileW
GetLastError
FindFirstFileA
DeleteAtom
GetFileTime
WriteFile
GetConsoleMode
FindAtomA
OpenFileMappingA
CreateDirectoryA
DeleteFileA
CopyFileExA
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ