Static task
static1
Behavioral task
behavioral1
Sample
d26683287fa891cc88b41b5724b581fedbbff02a326ed249e7b2be9274a2260f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d26683287fa891cc88b41b5724b581fedbbff02a326ed249e7b2be9274a2260f.exe
Resource
win10v2004-20240226-en
General
-
Target
d26683287fa891cc88b41b5724b581fedbbff02a326ed249e7b2be9274a2260f
-
Size
247KB
-
MD5
b47bd480aa229a169c6ea4379eed7541
-
SHA1
e1f3a26ae70ce69391b84064b2ad38d8c4f45176
-
SHA256
d26683287fa891cc88b41b5724b581fedbbff02a326ed249e7b2be9274a2260f
-
SHA512
c01b493926acaa6fd020b32291a449f57427623962b47079d46af0085e3d823e16033065079db319eb2645eb004d83d7f6d54af111e22097ee748c1f26e010dc
-
SSDEEP
6144:w5PfdPffadWjYagikGkUzjWcmTn5eNajMKYS5Tu1BfK:wjalagi1kiyn5eh3S5S1BC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d26683287fa891cc88b41b5724b581fedbbff02a326ed249e7b2be9274a2260f
Files
-
d26683287fa891cc88b41b5724b581fedbbff02a326ed249e7b2be9274a2260f.exe windows:1 windows x86 arch:x86
59c54023e46a803f6b256d7017051ca0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringA
ole32
CoInitialize
CoUninitialize
user32
DefWindowProcW
DestroyWindow
DispatchMessageW
EnableWindow
GetClientRect
GetDC
GetDlgItem
GetKeyState
GetSystemMetrics
GetWindowLongW
LoadAcceleratorsA
LoadCursorA
LoadCursorW
LoadIconA
LoadStringW
MessageBoxW
PostMessageW
PostQuitMessage
RegisterClassW
ReleaseDC
SendMessageW
SetWindowLongW
ShowWindow
wsprintfW
CreateWindowExW
kernel32
CloseHandle
GetCurrentProcess
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoW
GetTickCount
GetVersionExW
LoadLibraryA
VirtualProtect
lstrlenW
LoadLibraryW
ulib
??0ARGUMENT_LEXEMIZER@@QAE@XZ
??0ARRAY@@QAE@XZ
??0DSTRING@@QAE@XZ
??0FLAG_ARGUMENT@@QAE@XZ
??0STRING_ARGUMENT@@QAE@XZ
??1ARGUMENT_LEXEMIZER@@UAE@XZ
??1ARRAY@@UAE@XZ
??1DSTRING@@UAE@XZ
??1OBJECT@@UAE@XZ
??1STRING_ARGUMENT@@UAE@XZ
?DoParsing@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Initialize@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Initialize@ARRAY@@QAEEKK@Z
?Initialize@FLAG_ARGUMENT@@QAEEPAD@Z
?Initialize@STRING_ARGUMENT@@QAEEPAD@Z
?IsValueSet@ARGUMENT@@QAEEXZ
?PrepareToParse@ARGUMENT_LEXEMIZER@@QAEEPAVWSTRING@@@Z
?Put@ARRAY@@UAEEPAVOBJECT@@@Z
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QAEXE@Z
?Initialize@WSTRING@@QAEEPBDK@Z
ntdll
RtlFreeHeap
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
gdi32
GetObjectW
Sections
AUTO Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DGROUP Size: 128KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 226B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc2 Size: 483B - Virtual size: 483B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE