Static task
static1
Behavioral task
behavioral1
Sample
b94d4dbb02b4934b7d282009b8a2ed4d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b94d4dbb02b4934b7d282009b8a2ed4d.exe
Resource
win10v2004-20240226-en
General
-
Target
b94d4dbb02b4934b7d282009b8a2ed4d
-
Size
527KB
-
MD5
b94d4dbb02b4934b7d282009b8a2ed4d
-
SHA1
fdfadcbd5a5ed0ffdfe2310ba4a869b756405615
-
SHA256
d733da84cbf1086bbdb981cb8ab7f9c794a26b2b54ed7c89ede1a3c4069dcf65
-
SHA512
b16a52c48647026a015aec24b0b14fc263e4f594aa1b05edaf16d886092d02c074d86453b08c824d5e7c3067bbeff43d559b9be4f14994a60d2d7ed83b6d4614
-
SSDEEP
12288:iXz0sHrSJ8LIGimZqpIs9ow+sHmt6mir8:W0se1GiYyIs9oymyg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b94d4dbb02b4934b7d282009b8a2ed4d
Files
-
b94d4dbb02b4934b7d282009b8a2ed4d.exe windows:4 windows x86 arch:x86
08141bf2d54733670d7b79eaa1f115ac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
wininet
InternetCombineUrlW
user32
RegisterClassExA
GetDesktopWindow
GetActiveWindow
GetUserObjectInformationW
GetMenuItemInfoA
CharToOemBuffA
DestroyCaret
GetClipboardData
CreateDesktopW
ChangeClipboardChain
MapVirtualKeyW
GetKeyboardType
CreateMenu
GetCaretBlinkTime
RegisterClassA
SetWindowsHookA
InvalidateRgn
DdeConnectList
IsWindowEnabled
SwitchToThisWindow
GetWindowModuleFileNameA
SendInput
GetCursor
RegisterHotKey
DrawAnimatedRects
SetScrollPos
GetKeyNameTextW
kernel32
VirtualQueryEx
LoadModule
IsValidLocale
VirtualAlloc
HeapReAlloc
GetTimeZoneInformation
ReadFile
FindNextChangeNotification
TlsAlloc
LCMapStringW
GetEnvironmentStringsW
GetCurrentThread
SetConsoleCtrlHandler
LoadLibraryA
GetCurrentProcess
ExpandEnvironmentStringsA
SetUnhandledExceptionFilter
GetStdHandle
TlsSetValue
SetHandleCount
RtlMoveMemory
LCMapStringA
SetLastError
GetUserDefaultLCID
HeapAlloc
IsValidCodePage
GetSystemInfo
UnhandledExceptionFilter
InterlockedExchangeAdd
HeapDestroy
GetPrivateProfileSectionA
TlsGetValue
VirtualQuery
HeapFree
GetDateFormatA
InterlockedIncrement
CloseHandle
CompareStringA
GetVolumeInformationW
GetProcAddress
GetConsoleCP
GetStartupInfoW
GetACP
GetLastError
FreeLibrary
lstrcmpiW
IsDebuggerPresent
EnterCriticalSection
MapViewOfFileEx
GetConsoleMode
GetCurrentThreadId
GetLocaleInfoW
HeapSize
GetTimeFormatA
TlsFree
CreateMutexA
InterlockedExchange
GetFileType
GetSystemDefaultLangID
GetCommandLineW
SetEnvironmentVariableA
EnumResourceLanguagesW
InterlockedDecrement
VirtualFree
QueryPerformanceCounter
GetModuleHandleA
GetAtomNameW
GetCurrentProcessId
GetModuleFileNameA
SetFilePointer
InitializeCriticalSectionAndSpinCount
WriteConsoleA
FindAtomW
GetStartupInfoA
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
SetThreadAffinityMask
MultiByteToWideChar
FlushFileBuffers
CreateFileA
GetStringTypeW
GetTickCount
GetModuleFileNameW
WriteConsoleW
HeapCreate
ExitProcess
GetLocaleInfoA
SetStdHandle
GetCPInfo
GetStringTypeA
GetConsoleOutputCP
GetModuleHandleW
Sleep
RtlUnwind
LeaveCriticalSection
WriteFile
WideCharToMultiByte
EnumSystemLocalesA
DeleteCriticalSection
TerminateProcess
OpenMutexA
GetOEMCP
GetCommandLineA
CompareStringW
GetThreadPriority
shell32
RealShellExecuteA
Sections
.text Size: 189KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 315KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ