Static task
static1
Behavioral task
behavioral1
Sample
195081b133c4de88b1cc11d0c52d251d201ea23e0974768704cc3a272f022e4a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
195081b133c4de88b1cc11d0c52d251d201ea23e0974768704cc3a272f022e4a.exe
Resource
win10v2004-20240226-en
General
-
Target
195081b133c4de88b1cc11d0c52d251d201ea23e0974768704cc3a272f022e4a
-
Size
161KB
-
MD5
98fe5c4543d8691eb7ea05390e0eac9d
-
SHA1
a3422b90863ff3e0f9915f47fe845008ab2cb2c5
-
SHA256
195081b133c4de88b1cc11d0c52d251d201ea23e0974768704cc3a272f022e4a
-
SHA512
e29f1f8e3e08900322ae665d54545bac02c5c6931b72feb4bc8bd7f9b312f64bd0a5b4e0984f409f78f67c37ea7d57de4044f23e23a87c046ad83b5b2393998a
-
SSDEEP
3072:wKGrkCJj+pXHaS/cOJs0/r83WwuXdXcDpIPsg:wKGap3ze0D83WVsQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 195081b133c4de88b1cc11d0c52d251d201ea23e0974768704cc3a272f022e4a
Files
-
195081b133c4de88b1cc11d0c52d251d201ea23e0974768704cc3a272f022e4a.exe windows:1 windows x86 arch:x86
a11c2a003af7a01073d967b0f539304a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringA
user32
DefWindowProcW
DestroyWindow
DispatchMessageW
EnableWindow
GetCursorPos
GetMessageW
GetSystemMenu
GetWindowLongW
LoadStringW
MessageBoxW
PostMessageW
SendMessageW
SetWindowLongW
SetWindowTextW
TranslateMessage
wsprintfW
CreateWindowExW
kernel32
CloseHandle
CreateFileW
DeleteFileW
FormatMessageW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoW
GetStdHandle
GetSystemDirectoryW
GetTickCount
LoadLibraryA
LoadLibraryW
LocalFree
QueryPerformanceCounter
SetThreadUILanguage
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VirtualProtect
WideCharToMultiByte
lstrcmpW
lstrlenW
FreeLibrary
imm32
ImmGetContext
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
Sections
AUTO Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DGROUP Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.sys Size: 150B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE