Static task
static1
Behavioral task
behavioral1
Sample
c01bf08a663a6da9ca3fcd006acb6174.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c01bf08a663a6da9ca3fcd006acb6174.exe
Resource
win10v2004-20240226-en
General
-
Target
c01bf08a663a6da9ca3fcd006acb6174
-
Size
36KB
-
MD5
c01bf08a663a6da9ca3fcd006acb6174
-
SHA1
879aa16fdb47a400f12a746c366abfae160a96ad
-
SHA256
a7a2715825cfb81610ad829b484995f1b0cd02280045f433858dee0d423fa15f
-
SHA512
851015a2d274b35fd5f46e768349ae4432a7bc821f8089941a2321f2f785e22c88c71ba44bccd6cec0d8a0b41ebccf100c068591a557fd94ebdf8a5885dc3bfe
-
SSDEEP
768:i4u9Q2WvEudAvAHz/tIAqc2VmezsONhrPNd1DuXrgVTmMQ:i4ukvDTz/t/HksOvrPNdEXrG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c01bf08a663a6da9ca3fcd006acb6174
Files
-
c01bf08a663a6da9ca3fcd006acb6174.exe windows:3 windows x86 arch:x86
8627e2bb8a87b81ef6679d65b3963eb9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GlobalLock
GlobalUnlock
ReadFile
GetModuleHandleA
GetProcAddress
user32
GetWindowDC
SetActiveWindow
GetFocus
gdi32
EndDoc
LPtoDP
SetMapMode
Sections
PESEC0 Size: 226B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PESEC1 Size: 18KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 459B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 78B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ