Static task
static1
Behavioral task
behavioral1
Sample
02bb2cfda6753c83a3364795dad37686b0e603c8779b5ae4c5afb6818fb3ba97.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
02bb2cfda6753c83a3364795dad37686b0e603c8779b5ae4c5afb6818fb3ba97.exe
Resource
win10v2004-20240226-en
General
-
Target
02bb2cfda6753c83a3364795dad37686b0e603c8779b5ae4c5afb6818fb3ba97
-
Size
107KB
-
MD5
7baf40e72c63e53f92be8cd9ef427208
-
SHA1
31e8ac7222632c7f2f0904eafcca3f200fadecf2
-
SHA256
02bb2cfda6753c83a3364795dad37686b0e603c8779b5ae4c5afb6818fb3ba97
-
SHA512
489d7175f64736ca113032e1c659bc0e655c6d959ba7cf2bcd0e747eed6c77a6740501791426296e7a00dbaf37cc4fde255c115c2d20ab31c8728bee4bc6201f
-
SSDEEP
1536:iqa5lckzKOIAITqi5yqNb0KtRVVGiWNXXXJWdICwNEPrkuP3vEgR6DS7:ix+ku1AITqWlvtRVuVJWdaKLPfEgsS7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02bb2cfda6753c83a3364795dad37686b0e603c8779b5ae4c5afb6818fb3ba97
Files
-
02bb2cfda6753c83a3364795dad37686b0e603c8779b5ae4c5afb6818fb3ba97.exe windows:4 windows x86 arch:x86
4140b265403d5ba91bc3955707686011
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoRegisterClassObject
user32
SendMessageW
IsZoomed
GetWindowLongW
GetCursor
GetCapture
InsertMenuItemA
SystemParametersInfoA
SetForegroundWindow
FindWindowA
LoadKeyboardLayoutA
CharUpperBuffA
GetActiveWindow
RemovePropA
GetKeyboardLayoutNameA
GetMenuItemCount
IsWindowUnicode
EnumThreadWindows
GetKeyNameTextA
SendMessageA
MapVirtualKeyA
FillRect
DestroyMenu
DestroyCursor
SetWindowLongA
IsDialogMessageW
IsWindowVisible
OemToCharA
EnumWindows
advapi32
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
gdi32
GetClipBox
GetDCOrgEx
SetPixel
CreateDIBSection
CreateBrushIndirect
GetCurrentPositionEx
GetDIBits
GetObjectA
SetTextColor
GetPaletteEntries
shlwapi
SHStrDupA
SHSetValueA
SHDeleteValueA
PathGetCharTypeA
PathFileExistsA
SHEnumValueA
SHGetValueA
oleaut32
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
GetErrorInfo
OleLoadPicture
SysStringLen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
shell32
SHFileOperationA
DragQueryFileA
SHGetSpecialFolderLocation
SHGetDiskFreeSpaceA
kernel32
GetVersionExA
GetModuleHandleA
FreeResource
VirtualAlloc
GetProcessHeap
ExitProcess
LoadLibraryExA
GetProcAddress
MoveFileExA
lstrcpynA
GlobalAlloc
HeapDestroy
GetDateFormatA
GetTickCount
ExitThread
DeleteCriticalSection
LockResource
lstrcpyA
Sections
CODE Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 666B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ