Static task
static1
Behavioral task
behavioral1
Sample
b4a8408d59673479c318ebdd63a6aaf4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4a8408d59673479c318ebdd63a6aaf4.exe
Resource
win10v2004-20240226-en
General
-
Target
b4a8408d59673479c318ebdd63a6aaf4
-
Size
445KB
-
MD5
b4a8408d59673479c318ebdd63a6aaf4
-
SHA1
0e832363149c129fdd103a88b4574af921f17bf6
-
SHA256
6c5b4657cae8da6dd1130d4af956afda8cf6ceeebdd0ea3312022edef4d13814
-
SHA512
b2f13f962526f22987dea1d8533a8c78880eebd00050a6a390cea4a32cd136b98a46fbbc874f63e84a925f940ff0af19bbb40fe89f3fc47fe2892420f425f48f
-
SSDEEP
6144:2JdFzxGMQMvqw2DIbjbyYpfWtpEmuLE5X8JUzahv/cRjMpa07MZTS59qr7BXioVF:IFzek2qj4G8Z7ehHcVMpa0HiBt3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4a8408d59673479c318ebdd63a6aaf4
Files
-
b4a8408d59673479c318ebdd63a6aaf4.exe windows:4 windows x86 arch:x86
80de7896636443da3a3b5b82819984ec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SearchPathA
FileTimeToSystemTime
IsDBCSLeadByte
GlobalDeleteAtom
GlobalAddAtomA
CreateProcessA
GetShortPathNameA
WriteProfileStringA
CopyFileA
SystemTimeToFileTime
GetFileTime
GetExitCodeProcess
SetFileAttributesA
GetFileAttributesA
GetSystemDirectoryA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetCurrentThreadId
GetUserDefaultLangID
GetVersionExA
GetModuleHandleA
GetEnvironmentVariableA
GetWindowsDirectoryA
GetCurrentDirectoryA
CreateDirectoryA
lstrcatA
DeleteFileA
lstrlenA
FindResourceA
SizeofResource
LoadResource
LockResource
GetStartupInfoA
FreeResource
lstrcpynA
MultiByteToWideChar
lstrcmpA
lstrcpyA
SetFileTime
FlushFileBuffers
SetLastError
CloseHandle
LocalAlloc
CreateFileA
LocalFree
GetFileSize
ReadFile
SetFilePointer
GetLastError
GetVolumeInformationA
WriteFile
user32
SetFocus
CheckDlgButton
KillTimer
EndPaint
DrawIcon
BeginPaint
IsIconic
DestroyIcon
UnhookWindowsHookEx
SetWindowsHookExA
GetClassInfoA
GetSystemMetrics
SendDlgItemMessageA
SetTimer
CharNextA
GetDesktopWindow
GetWindowRect
GetDlgItem
EnableWindow
PackDDElParam
FreeDDElParam
GetDlgItemTextA
MoveWindow
PostMessageA
FindWindowA
WaitForInputIdle
SendMessageA
LoadIconA
SetWindowTextA
CharUpperA
SetDlgItemTextA
PeekMessageA
IsDialogMessageA
TranslateMessage
wsprintfA
CharLowerA
CharPrevA
EndDialog
MessageBoxA
GetWindowLongA
CallNextHookEx
DialogBoxIndirectParamA
SystemParametersInfoA
DispatchMessageA
gdi32
SetMapMode
GetMapMode
comdlg32
GetOpenFileNameA
GetFileTitleA
advapi32
RegOpenKeyA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegSetValueExA
RegCreateKeyExA
RegSetValueA
shell32
ShellExecuteA
crtdll
strchr
_global_unwind2
memcpy
exit
_local_unwind2
strrchr
atoi
memset
_exit
_XcptFilter
_acmdln_dll
_initterm
__GetMainArgs
_commode_dll
_fmode_dll
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 373B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ