Static task
static1
Behavioral task
behavioral1
Sample
b9365e54e04ed4b3ad9439b230d1d94e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b9365e54e04ed4b3ad9439b230d1d94e.exe
Resource
win10v2004-20240226-en
General
-
Target
b9365e54e04ed4b3ad9439b230d1d94e
-
Size
390KB
-
MD5
b9365e54e04ed4b3ad9439b230d1d94e
-
SHA1
f6b9c55dfe8c0119ba4afe719f9a153579c11233
-
SHA256
91b015aaf6686774aeba88b302443c6547a1a758329d8fa6834c8b47c7bdc500
-
SHA512
2e6d5bcb1a424ab939e90b1b06c82b1504ff6376b4a3a21b9cd20f2303331528647c94dfa4bcd59ccd2bb17049ebd251588f7c5afff0f1f2a3eb4d5b5f06e530
-
SSDEEP
6144:eqwD+X1xQatU+1CEJp4XEt8l3aw9Y6zfJvkeitTDYWMtrDVmCfNuI2RINhoDPnr:MO1xm+QoK0t4K3gCTDYWGrYzt+NST
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9365e54e04ed4b3ad9439b230d1d94e
Files
-
b9365e54e04ed4b3ad9439b230d1d94e.exe windows:4 windows x86 arch:x86
bbb19bb3b3f46e850ef44fb73c3ad5bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
GetModuleHandleA
UnmapViewOfFile
LoadLibraryW
HeapCreate
CloseHandle
lstrlenA
FormatMessageA
GetDiskFreeSpaceA
GetCommandLineW
Sleep
GetSystemTime
CreateFileA
LocalFree
GetComputerNameA
LocalUnlock
SetLastError
GetTickCount
FindVolumeClose
CreateThread
user32
FillRect
GetDlgItem
CreateWindowExA
DrawEdge
DrawMenuBar
CallWindowProcA
DispatchMessageA
SetFocus
GetDC
IsWindow
DrawStateA
GetComboBoxInfo
CheckRadioButton
advapi32
RegDeleteKeyA
FreeSid
RegEnumValueA
RegCloseKey
IsTokenUntrusted
hdwwiz.cpl
AddHardwareWizard
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 732KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ