Static task
static1
Behavioral task
behavioral1
Sample
cb4893e7636ac443b2ed322ceed5d67a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb4893e7636ac443b2ed322ceed5d67a.exe
Resource
win10v2004-20240226-en
General
-
Target
cb4893e7636ac443b2ed322ceed5d67a
-
Size
498KB
-
MD5
cb4893e7636ac443b2ed322ceed5d67a
-
SHA1
d079ff1d175de97210345081cdb0346ec1393b42
-
SHA256
36c9317b353a86650a432f04b56e6a3e257189701a530555894137a7c4ae95e2
-
SHA512
3aae784b6376633fe927465985023858071bf82b640f93ffe1c627c2a934f67db512584920078b0e2e3615b3901a08738a3888747ce91fdb3d0917f01d228252
-
SSDEEP
6144:yJhKBgqJMYucH+Sv2UDn+C0jj3+VAurnVv4Ch9s7cae6ZaKSqeABLs1SWcDDDDk:yJhqgqJMaHp27j34GCfs7cafE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cb4893e7636ac443b2ed322ceed5d67a
Files
-
cb4893e7636ac443b2ed322ceed5d67a.exe windows:4 windows x86 arch:x86
3518efc6926ee5ff2f082d11931d84ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
PulseEvent
CreateFileA
Sleep
IsDebuggerPresent
GetModuleFileNameW
lstrlenA
DeviceIoControl
IsBadStringPtrW
HeapCreate
GetModuleHandleA
ReleaseMutex
TlsGetValue
CreateFileMappingW
HeapDestroy
GetStartupInfoA
DeleteFileA
TlsAlloc
GetDriveTypeA
TlsGetValue
user32
IsZoomed
DispatchMessageA
PeekMessageA
GetWindowLongA
FindWindowW
DrawTextW
IsWindow
DestroyWindow
GetIconInfo
CallWindowProcW
DestroyMenu
DispatchMessageA
LoadImageA
colbact
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 491KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ