Static task
static1
Behavioral task
behavioral1
Sample
b639e7e46698f9bf0ae08b19f57d5f8d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b639e7e46698f9bf0ae08b19f57d5f8d.exe
Resource
win10v2004-20240226-en
General
-
Target
b639e7e46698f9bf0ae08b19f57d5f8d
-
Size
38KB
-
MD5
b639e7e46698f9bf0ae08b19f57d5f8d
-
SHA1
d24870a26bbd614e9efb819ae3027d62016406ef
-
SHA256
c7aaf6be923b011e5c1b74969352afe2155c87ca1eb68fe7b5c45ee64fd6df99
-
SHA512
d0f0f410cb916b9ddc549085bdae1c7a2a875aa3da3e6b57b5e2f10a62648f1e64eeceb6a73bd27d359c26ef38fcf6624ea94b9eec7c78a11d956ee0b1d27650
-
SSDEEP
768:iXLcCyut+E0gjwiXZ6thJSPn9DM4/gsWGGioQc8t:ioq4gjwiUthJW1IHGGS3t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b639e7e46698f9bf0ae08b19f57d5f8d
Files
-
b639e7e46698f9bf0ae08b19f57d5f8d.exe windows:4 windows x86 arch:x86
0c557728605602010ce6547d6ce0b047
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
FreeLibrary
GetCommandLineA
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
lstrcpyn
lstrlen
MultiByteToWideChar
VirtualAlloc
VirtualFree
VirtualProtect
WideCharToMultiByte
user32
BeginPaint
GetWindowDC
ReleaseCapture
ReleaseDC
SendMessageA
SetCursor
SetForegroundWindow
SetMenu
SetMenuItemInfoA
SetPropA
SetScrollPos
SetScrollRange
SetSysColors
SetTimer
SetWindowLongA
SetWindowPos
ShowWindow
SystemParametersInfoA
TranslateMessage
UpdateWindow
ValidateRect
WaitMessage
wvsprintfA
gdi32
CombineRgn
CreateBrushIndirect
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
GetDeviceCaps
GetPixel
GetStockObject
MoveToEx
Rectangle
RestoreDC
SaveDC
SelectObject
SetBkColor
SetBkMode
SetBrushOrgEx
Sections
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CRT Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE