Static task
static1
Behavioral task
behavioral1
Sample
ac478b55a21ae03fdf5f814163b16782.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac478b55a21ae03fdf5f814163b16782.exe
Resource
win10v2004-20240226-en
General
-
Target
ac478b55a21ae03fdf5f814163b16782
-
Size
17KB
-
MD5
ac478b55a21ae03fdf5f814163b16782
-
SHA1
1d122823f487ee19186b39652fde25641e3bd2e2
-
SHA256
6188850446986c42d4a7cee1aad1a6cf96ecdfba0909975b95ae54f233cc15cd
-
SHA512
4f07387bbd990d9f01e393112a00ae6fcc8f36dd33ab0fd6365602ff80253e0d3d0bb10309bd0eaa3c2366640ce49ddcd8ccf6d3ffbb987e7219f21d85ac6f4b
-
SSDEEP
192:ZZJ1c8fOBL9BwkTa+RpBm4Yt5ihDfDQHjkLXjkLFWcV8glzYB0io0GvaV+4KNSb+:ZhA9Ib5iBbWiXizV8glU0DSV5q0g7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac478b55a21ae03fdf5f814163b16782
Files
-
ac478b55a21ae03fdf5f814163b16782.exe windows:4 windows x86 arch:x86
e19264a609b7daf100e03f497d07393a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
VirtualProtect
CreateJobObjectA
TryEnterCriticalSection
IsValidCodePage
GetBinaryTypeW
GetPrivateProfileStructA
EndUpdateResourceA
GetLastError
EnumSystemCodePagesA
GetCompressedFileSizeA
VerifyConsoleIoHandle
DeleteAtom
MoveFileWithProgressW
GetConsoleInputExeNameA
RtlUnwind
ExpandEnvironmentStringsA
DeviceIoControl
GetDiskFreeSpaceW
GetEnvironmentVariableW
user32
SetDlgItemInt
InSendMessage
SetInternalWindowPos
IMPSetIMEW
DeleteMenu
InvalidateRgn
RegisterClassA
CharNextA
UnregisterClassA
SetCaretPos
LoadAcceleratorsA
VkKeyScanExA
GetProcessDefaultLayout
IMPGetIMEA
IsCharUpperW
FrameRect
SetUserObjectSecurity
GetTitleBarInfo
User32InitializeImmEntryTable
MonitorFromPoint
GetAltTabInfoW
IntersectRect
ScrollDC
GetCaretBlinkTime
GetDlgItemInt
SetSystemCursor
DdeConnectList
CreateMenu
RegisterClassW
IsIconic
GetShellWindow
CreateAcceleratorTableA
MessageBoxExA
DrawTextA
SetClipboardData
DrawMenuBarTemp
SendIMEMessageExW
GetScrollBarInfo
GetListBoxInfo
MonitorFromRect
CharNextExA
DlgDirSelectComboBoxExW
LookupIconIdFromDirectoryEx
IsDlgButtonChecked
SetMenuItemBitmaps
mouse_event
GetParent
OemToCharBuffA
LockWindowUpdate
RegisterHotKey
ScreenToClient
GetWindowTextLengthA
GetGUIThreadInfo
RegisterLogonProcess
gdi32
GdiPlayPrivatePageEMF
AnyLinkedFonts
GetCharWidth32A
GetWindowExtEx
GetBrushOrgEx
GdiEntry14
ExtFloodFill
CreateDIBitmap
GetColorAdjustment
GdiConvertAndCheckDC
GdiEntry5
Chord
EnumObjects
CLIPOBJ_bEnum
CreateICW
GdiFlush
SetBkMode
GetPath
EngUnlockSurface
EnumFontFamiliesW
STROBJ_vEnumStart
PtVisible
SetBitmapBits
GetEnhMetaFileHeader
CreatePenIndirect
PolyTextOutA
GdiDescribePixelFormat
CombineRgn
GdiProcessSetup
comdlg32
Ssync_ANSI_UNICODE_Struct_For_WOW
ReplaceTextA
ChooseFontA
PrintDlgA
dwLBSubclass
PrintDlgExW
GetSaveFileNameW
ChooseColorA
FindTextW
GetOpenFileNameW
CommDlgExtendedError
GetFileTitleW
psapi
GetModuleBaseNameA
GetModuleInformation
GetWsChanges
GetDeviceDriverBaseNameW
GetDeviceDriverFileNameA
EmptyWorkingSet
GetProcessMemoryInfo
EnumProcessModules
GetModuleBaseNameW
InitializeProcessForWsWatch
EnumDeviceDrivers
GetMappedFileNameA
QueryWorkingSet
GetMappedFileNameW
GetDeviceDriverBaseNameA
GetDeviceDriverFileNameW
comctl32
ImageList_ReplaceIcon
PropertySheet
ImageList_DragEnter
ImageList_GetIcon
FlatSB_GetScrollInfo
GetMUILanguage
ImageList_BeginDrag
ImageList_EndDrag
FlatSB_SetScrollProp
ImageList_SetImageCount
InitCommonControlsEx
CreateStatusWindowW
ImageList_GetImageRect
ImageList_GetImageCount
ImageList_LoadImageA
FlatSB_ShowScrollBar
DrawStatusText
ImageList_Remove
ImageList_SetFlags
ImageList_Draw
CreateToolbarEx
DestroyPropertySheetPage
FlatSB_GetScrollProp
DrawStatusTextW
FlatSB_SetScrollInfo
CreateStatusWindow
Sections
.text Size: 4KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE