Static task
static1
Behavioral task
behavioral1
Sample
b71391435d12c4cd3f062cc108e80d42.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b71391435d12c4cd3f062cc108e80d42.exe
Resource
win10v2004-20240226-en
General
-
Target
b71391435d12c4cd3f062cc108e80d42
-
Size
125KB
-
MD5
b71391435d12c4cd3f062cc108e80d42
-
SHA1
df71e545fb23bcbc8ce98555bb17bb5873f974bc
-
SHA256
cf3ed8e7341b3f399efff484d02a329ed850b28cf49753d04e5f16a428a398e0
-
SHA512
92b85b6801e68063f6a2faf4f28e7abbcf64875ca6226ea03023f39fbe52ca089df347245079ceafc688bb51b68d4887dfc9a631b417ce94a3deb0ae683e8db4
-
SSDEEP
3072:Zte3x4ZEwAPawD7jJu9bKMc57zZRNHCuXTGQpR8DTe7pLYRpe72f2+8Nj13bOL5Z:Zra1zG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b71391435d12c4cd3f062cc108e80d42
Files
-
b71391435d12c4cd3f062cc108e80d42.exe windows:4 windows x86 arch:x86
fdfcc21274016830f875d04c8cf7f3f6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
sfcdll
_SfcDll_DeleteFileData@8
_FileType_Restore@8
_VDF_Close@8
_VDF_LoadFiles@0
_Folder_GetFlags@8
_FileType_Add@8
_FileType_Link@8
_VDF_LoadFoldersTypesCabs@0
_Folder_SetFlags@8
_VDF_Open@8
_File_AddHere@40
_Folder_Remove@8
_FileType_Remove@8
_File_GetType@8
_Folder_Add@12
_File_GetNext@16
_FileType_GetFlags@8
_File_Updated@4
_File_Remove@4
_FileType_LookUp@12
_LDID_GetPath@12
_SfcDll_UpdateFileData@36
_File_UpdateInfo@32
_CAB_GetName@12
_Folder_GetNext@20
_File_LookUp@16
_Folder_GetName@12
_FileType_GetFolder@8
_FileType_GetNext@20
kernel32
GetFileType
GetTimeFormatA
VirtualAlloc
GetDateFormatA
HeapFree
VirtualFree
HeapAlloc
HeapDestroy
GetStdHandle
HeapCreate
GetCommandLineA
GetVersion
GetStartupInfoA
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
TerminateProcess
GetCurrentProcess
SetCurrentDirectoryA
GetCurrentDirectoryA
_lclose
LocalFree
_lread
LocalAlloc
GetFileSize
_lopen
lstrcpynA
lstrlenA
FileTimeToLocalFileTime
FindClose
FindFirstFileA
lstrcpyA
DeleteFileA
lstrcmpiA
GetLastError
CopyFileA
MultiByteToWideChar
MoveFileA
GetTempFileNameA
FindNextFileA
SetFileAttributesA
CloseHandle
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateFileA
WriteFile
SetFilePointer
GetTempPathA
ReadFile
SetLastError
lstrcmpA
FileTimeToDosDateTime
lstrcatA
MoveFileExA
ExitProcess
FileTimeToSystemTime
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersionExA
GetWindowsDirectoryA
GetPrivateProfileStringA
GetPrivateProfileIntA
FormatMessageA
GetModuleHandleA
GetLocalTime
IsDBCSLeadByte
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetShortPathNameA
GetEnvironmentStringsW
GetDriveTypeA
RemoveDirectoryA
CreateDirectoryA
DeviceIoControl
GetSystemDirectoryA
GetACP
GetCPInfo
FreeEnvironmentStringsA
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStrings
RtlUnwind
GetModuleFileNameA
GetOEMCP
UnhandledExceptionFilter
user32
GetSystemMenu
PeekMessageA
MessageBoxA
DeleteMenu
AppendMenuA
DestroyWindow
EnableWindow
PostQuitMessage
DefDlgProcA
LoadImageA
RegisterClassExA
CreateDialogParamA
PostMessageA
GetMessageA
TranslateMessage
GetWindowLongA
GetClientRect
DispatchMessageA
WinHelpA
LoadIconA
KillTimer
SetTimer
IsDlgButtonChecked
IsDialogMessageA
CheckDlgButton
ExitWindowsEx
GetSystemMetrics
CharPrevA
FindWindowA
IsIconic
BringWindowToTop
GetLastActivePopup
ShowWindow
SetForegroundWindow
LoadCursorA
SetCursor
wsprintfA
CheckRadioButton
SetFocus
MessageBeep
SetWindowTextA
EndDialog
DialogBoxParamA
GetWindowTextLengthA
GetWindowTextA
SetWindowLongA
GetParent
SendMessageA
CharNextA
GetActiveWindow
GetDlgItem
LoadStringA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegEnumValueA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegDeleteValueA
RegCreateKeyA
RegCloseKey
RegSetValueExA
shell32
ShellAboutA
SHGetDesktopFolder
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
comctl32
PropertySheetA
ord17
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE