Static task
static1
Behavioral task
behavioral1
Sample
cb38e903eb90e935de47a71bd29a4d45.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb38e903eb90e935de47a71bd29a4d45.exe
Resource
win10v2004-20240226-en
General
-
Target
cb38e903eb90e935de47a71bd29a4d45
-
Size
43KB
-
MD5
cb38e903eb90e935de47a71bd29a4d45
-
SHA1
d16636e5854b2fd6f6fbc1ea11f55c0be3718063
-
SHA256
d78d71b8bfa04c14d75317ad4fb4696f7bfabb631a808c0a8124db4da81d047b
-
SHA512
a2ed797837001abeae71e4a48823623b496af80e54ff051ca2fb25c55fe816cf76e86167923ae4ec9d1a4d85693c8b8d95d639d66c4964924c8ce5f1df933c16
-
SSDEEP
768:sc3eZG7mhiZzi3kJBGBotpDDwcPvrw5hdadzHt7EF3EMuj6UOLFBvKZbZzNCyLoF:x3eZriZ2aBG+hDRAa55V7uURpZQOU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cb38e903eb90e935de47a71bd29a4d45
Files
-
cb38e903eb90e935de47a71bd29a4d45.exe windows:4 windows x86 arch:x86
832c6168446985fee0b0698ca62401b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FindWindowExA
GetMenu
IsWindow
FindWindowA
GetWindowTextA
wsprintfA
BlockInput
keybd_event
SetForegroundWindow
SetFocus
ShowWindow
CharLowerA
MessageBoxA
CloseClipboard
SendMessageA
SetClipboardData
EmptyClipboard
OpenClipboard
VkKeyScanA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantInit
VariantClear
SysFreeString
SysAllocString
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
IsDebuggerPresent
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
QueryPerformanceFrequency
WideCharToMultiByte
GetFileAttributesA
GetLogicalDriveStringsA
GetDriveTypeA
lstrcatA
SetFileAttributesA
TerminateThread
lstrlenA
lstrcpyA
lstrcmpA
lstrcpynA
ExitThread
Sleep
ExitProcess
GetTempPathA
GetLastError
CreateThread
lstrcmpiA
QueryPerformanceCounter
GetTickCount
WaitForSingleObject
CreateProcessA
CloseHandle
WriteFile
CreateFileA
ReleaseMutex
CreateMutexA
ExpandEnvironmentStringsA
GetModuleFileNameA
GetModuleHandleA
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
GetLocaleInfoA
GetVersionExA
GlobalUnlock
GlobalLock
GlobalAlloc
GetWindowsDirectoryA
InterlockedDecrement
CopyFileA
CreateDirectoryA
msvcr80
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler4_common
_crt_debugger_hook
_invoke_watson
_controlfp_s
sprintf
strncpy
strstr
strchr
strcmp
rand
strcpy
memset
memcpy
atoi
srand
strcat
free
malloc
strlen
memcmp
_vsnprintf
??2@YAPAXI@Z
??3@YAXPAX@Z
??_V@YAXPAX@Z
__CxxFrameHandler3
_snprintf
strtok
_unlock
_encode_pointer
__dllonexit
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
advapi32
GetUserNameA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
ws2_32
ioctlsocket
socket
connect
WSAStartup
WSASocketA
setsockopt
WSACleanup
htons
sendto
closesocket
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 273KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ