Static task
static1
Behavioral task
behavioral1
Sample
cbea18ce0e43d529744f9508f8c8d03b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
cbea18ce0e43d529744f9508f8c8d03b.exe
Resource
win10v2004-20240226-en
General
-
Target
cbea18ce0e43d529744f9508f8c8d03b
-
Size
81KB
-
MD5
cbea18ce0e43d529744f9508f8c8d03b
-
SHA1
002a8a4366dfd063bf6af92424fe424d110172c0
-
SHA256
eaff9619d084339832149cebaa5cae38d09b55c5eb57b7de6b330e27d429e35d
-
SHA512
7921af6517e70b9aaee46617cc98c3da74d046feeb344266b3f52b25adf9eaccc3f8bbf25d711b25d76b41e91ccdb3e3ec56c4fd278bf0906f8c65792d230b4f
-
SSDEEP
1536:puqbpP92Dzjg+0J2InXkEXWH2Px0UaqDgaC:puqbpP4jv0jXWH2Px0UnC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cbea18ce0e43d529744f9508f8c8d03b
Files
-
cbea18ce0e43d529744f9508f8c8d03b.exe windows:5 windows x86 arch:x86
75fd89f0f6d42de86241954850f64b9a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
EnterCriticalSection
lstrlenW
LoadLibraryW
CreateProcessW
WaitForSingleObject
CloseHandle
GetStringTypeW
MultiByteToWideChar
LCMapStringW
IsProcessorFeaturePresent
WideCharToMultiByte
HeapReAlloc
Sleep
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
HeapAlloc
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapCreate
GetModuleHandleW
GetProcAddress
CreateThread
GetTickCount
SetProcessPriorityBoost
SetThreadPriority
SetPriorityClass
GetVersionExW
lstrcatA
GetEnvironmentVariableA
lstrcpyA
GetShortPathNameA
GetModuleFileNameA
GetCurrentProcess
VirtualAlloc
TerminateProcess
VirtualFree
VirtualProtect
IsValidCodePage
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
user32
CallNextHookEx
EndPaint
LoadBitmapW
BeginPaint
DefWindowProcW
SetFocus
UpdateWindow
ShowWindow
SetCursor
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
LoadStringW
SystemParametersInfoW
SetWindowsHookExW
GetWindowTextW
SetWindowTextW
gdi32
TextOutW
SetTextColor
SetBkMode
DeleteDC
BitBlt
CreateCompatibleDC
GetObjectW
LineTo
MoveToEx
Rectangle
SelectObject
CreatePen
CreateFontW
DeleteObject
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
shell32
ShellExecuteExA
shlwapi
StrCpyW
gdiplus
GdiplusShutdown
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ