Static task
static1
Behavioral task
behavioral1
Sample
c40bb38d5bd938e53f6feaf4dd796f8a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c40bb38d5bd938e53f6feaf4dd796f8a.exe
Resource
win10v2004-20240226-en
General
-
Target
c40bb38d5bd938e53f6feaf4dd796f8a
-
Size
58KB
-
MD5
c40bb38d5bd938e53f6feaf4dd796f8a
-
SHA1
99b5b3158d10707351993cfee1d7f930bd9c0095
-
SHA256
7d3f735f65760c3b98713ca3b600b28ff634d104994287efcba67717b1314a5c
-
SHA512
788633aaf606d8dc560c5bcb5410740d6c889b36ea59a96c8138c9fd407c37b36a2061eb30f632e9b793462ad14e5a510e19d4ce8cbc4728e58a764f23dc2e64
-
SSDEEP
1536:PxVMagd9EcyDgqkVyPfin+hsy2oW20FMEDkwgnF:+d9EcYgqiyChF3YpF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c40bb38d5bd938e53f6feaf4dd796f8a
Files
-
c40bb38d5bd938e53f6feaf4dd796f8a.exe windows:4 windows x86 arch:x86
b24a38fcdcb9d7054416057191e51616
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetEnvironmentVariableA
CreateMutexW
CloseHandle
HeapCreate
AddAtomA
GetCurrentDirectoryA
GetFileSize
ExitProcess
HeapSize
ReleaseMutex
InitializeCriticalSection
SuspendThread
HeapDestroy
GetTickCount
WaitForSingleObject
GetCalendarInfoA
DeleteFileA
GetModuleHandleA
FindClose
SetLastError
GetProfileIntW
GetStartupInfoW
ResetEvent
CreateFileA
user32
CallWindowProcW
GetClassInfoA
DispatchMessageW
MessageBoxA
GetWindowLongA
GetCursorPos
GetSysColor
GetDC
GetDC
GetDC
DispatchMessageW
PeekMessageA
GetDC
dmintf
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ