Static task
static1
Behavioral task
behavioral1
Sample
b786ff04d6d29976f05472aa418b5a84.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b786ff04d6d29976f05472aa418b5a84.exe
Resource
win10v2004-20240226-en
General
-
Target
b786ff04d6d29976f05472aa418b5a84
-
Size
266KB
-
MD5
b786ff04d6d29976f05472aa418b5a84
-
SHA1
7a539ef65aff37a3b1746f091c27f55c9c0cfdfd
-
SHA256
d14e84134ea12eacb62183b6dce4adc12900e059bd815267490ac83f982d51e3
-
SHA512
e59c94da0fb0cf403aba61d4fe5c5b678cebedc2010936e24a458c7ced87a4d858affa3ece145225ccbe779a6ee973bb27a6233bda20c94391fcd6201ec2cc31
-
SSDEEP
6144:HP5pha7nxsmRbxjRBVmP5EN+KWzIVdYTefEO93xQoTVN:v56xsax5WaN+fzI3YMf3xQMb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b786ff04d6d29976f05472aa418b5a84
Files
-
b786ff04d6d29976f05472aa418b5a84.exe windows:4 windows x86 arch:x86
10b3c9f34a7bc98783f30fcaed6d8aa2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetModuleFileNameW
GetLastError
GetTickCount
LocalFree
GetVersionExW
GetCurrentProcess
FreeLibrary
lstrlenW
lstrcpynW
GetFileAttributesA
GetFullPathNameA
MultiByteToWideChar
lstrlenA
lstrcpynA
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
Sleep
GetFileAttributesW
GetWindowsDirectoryW
LoadLibraryW
LoadLibraryA
GetProcAddress
user32
SendMessageW
SetForegroundWindow
EnableWindow
advapi32
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegDeleteKeyA
shell32
SHGetDesktopFolder
SHGetSpecialFolderLocation
loadperf
SetServiceAsTrustedW
UpdatePerfNameFilesW
UnloadPerfCounterTextStringsW
InstallPerfDllA
ntshrui
IsPathSharedA
GetNetResourceFromLocalPathW
Sections
.edata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.F Size: 2KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.NWBW Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.HjYSuh Size: 5KB - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 81KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.K Size: 3KB - Virtual size: 520KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.m Size: 5KB - Virtual size: 983KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 134KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gufbRb Size: 4KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ