Static task
static1
Behavioral task
behavioral1
Sample
c93b26f35eaf3df0dba82eba8dc0986b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c93b26f35eaf3df0dba82eba8dc0986b.exe
Resource
win10v2004-20240226-en
General
-
Target
c93b26f35eaf3df0dba82eba8dc0986b
-
Size
290KB
-
MD5
c93b26f35eaf3df0dba82eba8dc0986b
-
SHA1
49f9a0bb4b7d49f5f0bee898771258ec25b81933
-
SHA256
6e1e6ca261ec9b53cb8aa30af0e3c1610c6d7ac243368df9dbb80bd8f1d2f3f8
-
SHA512
2aab9b6404186c80639993a98041c6ad3ae8fa31a5e110b937ead4c4144a0e5e42cf0cccbc08a3be47c5028ee5e6564a9df52b4602c884a5e9d130212d471e15
-
SSDEEP
6144:NUo35gsLL2scxl+CULn5IH6URjVtP74f/9JF:yo35gsLCVxXULUxr74X3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c93b26f35eaf3df0dba82eba8dc0986b
Files
-
c93b26f35eaf3df0dba82eba8dc0986b.exe windows:4 windows x86 arch:x86
143ed451e94eb4c5cc2b14b4e98e4ab6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
InsertMenuItemW
SendDlgItemMessageA
GetMenuStringA
RegisterWindowMessageA
RemovePropA
EmptyClipboard
DdeClientTransaction
DestroyWindow
GetIconInfo
GetDC
AppendMenuA
UpdateWindow
GetCaretPos
advapi32
LookupPrivilegeValueW
IsValidSecurityDescriptor
RegQueryInfoKeyA
GetUserNameW
comdlg32
ChooseColorA
GetFileTitleW
GetSaveFileNameW
kernel32
InterlockedIncrement
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
InterlockedDecrement
GetStringTypeExW
MultiByteToWideChar
LoadLibraryA
GetProcAddress
VirtualAlloc
UnhandledExceptionFilter
GetConsoleMode
GetDiskFreeSpaceW
SetEnvironmentVariableA
RaiseException
DeleteFileA
SetNamedPipeHandleState
GetModuleHandleA
OpenFileMappingW
VirtualProtect
GetThreadLocale
GetSystemDirectoryW
SetThreadPriority
QueryDosDeviceA
FreeEnvironmentStringsW
DeleteCriticalSection
HeapAlloc
TlsSetValue
CompareStringA
OutputDebugStringW
VirtualFree
FileTimeToLocalFileTime
DebugBreak
GetSystemInfo
GetLocaleInfoW
SearchPathW
LocalFileTimeToFileTime
LocalLock
OpenEventW
GlobalFindAtomW
GetModuleFileNameA
GlobalDeleteAtom
FindCloseChangeNotification
GetProfileStringW
GlobalMemoryStatus
DuplicateHandle
QueueUserWorkItem
OpenFileMappingA
OpenFile
GlobalGetAtomNameW
GetModuleFileNameW
MapViewOfFileEx
WritePrivateProfileStringW
Beep
SuspendThread
GetConsoleOutputCP
GetPrivateProfileIntW
GetVersionExA
WritePrivateProfileStringA
CreateMutexW
FileTimeToDosDateTime
GetProfileStringA
GetComputerNameW
GetLogicalDriveStringsA
DeleteTimerQueueTimer
SetThreadExecutionState
PulseEvent
TlsAlloc
GetCurrentDirectoryW
GlobalUnlock
GlobalAddAtomA
GetProcessAffinityMask
GetLastError
GetFileAttributesExW
HeapDestroy
GetSystemDirectoryA
FindResourceExA
lstrcpyA
HeapReAlloc
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WriteFile
RtlUnwind
HeapFree
HeapCreate
GetEnvironmentVariableA
TlsGetValue
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
FreeEnvironmentStringsA
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetCurrentThreadId
SetLastError
shell32
SHCreateDirectoryExW
SHGetFolderPathAndSubDirW
DragQueryFileW
oleaut32
SysFreeString
ole32
ReadFmtUserTypeStg
CoUninitialize
OleGetClipboard
GetClassFile
OleInitialize
OleLockRunning
CoInitializeEx
OleCreateLinkFromData
Sections
.text Size: 246KB - Virtual size: 245KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
wwkymy Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
aisiei Size: 14KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mgqoc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE