Static task
static1
Behavioral task
behavioral1
Sample
b43c94a54e52b246139d70534a3321d7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b43c94a54e52b246139d70534a3321d7.exe
Resource
win10v2004-20240226-en
General
-
Target
b43c94a54e52b246139d70534a3321d7
-
Size
34KB
-
MD5
b43c94a54e52b246139d70534a3321d7
-
SHA1
46899569f33d9682c8f48a92cc0d73e59f72b9fd
-
SHA256
c26f2edf86555e23ccfeb0664744f1da32446310d50d9439edb9080d8bea562a
-
SHA512
9a96fcdc6f94950b39e6f03a19d198f2697a67ce9d2eb6e70958a61778c206ae001f549ef3b0fca61057eb7794e451f7823b4738c8ea96f775a819991ab0ab0e
-
SSDEEP
768:m/tYCIW/YZGtv0zbN2D664B6PEUrC+GvPVLc:eFIWgGCzbN2mr6PrJGvi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b43c94a54e52b246139d70534a3321d7
Files
-
b43c94a54e52b246139d70534a3321d7.exe windows:4 windows x86 arch:x86
b0f4a0f539172f0845a7dc82360abea0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToDosDateTime
CreateNamedPipeA
GetCurrentDirectoryA
ExitProcess
GetTempFileNameA
VirtualProtectEx
GetTempFileNameW
ConnectNamedPipe
GetShortPathNameA
MultiByteToWideChar
user32
AppendMenuW
CreatePopupMenu
GetMenuItemID
GetSysColorBrush
ShowWindow
LoadIconA
mouse_event
GetSubMenu
LoadBitmapW
RegisterClassA
msvcrt
_mbclen
strspn
_chgsign
_CIsqrt
__p__mbctype
_mbccpy
_mbctohira
_clearfp
fabs
strncpy
gdi32
SetBkColor
FillRgn
CreatePen
advapi32
RegCreateKeyExA
comdlg32
GetFileTitleW
shell32
ExtractIconA
SHCoCreateInstance
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ