Static task
static1
Behavioral task
behavioral1
Sample
d6db94e3ecd232783aa528de6458983d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d6db94e3ecd232783aa528de6458983d.exe
Resource
win10v2004-20240226-en
General
-
Target
d6db94e3ecd232783aa528de6458983d
-
Size
83KB
-
MD5
d6db94e3ecd232783aa528de6458983d
-
SHA1
237b026846aeafcab86e0cde37eb0eafc04326d3
-
SHA256
1825bc6fe935f4b424d27d442aee294c52e051e9a90beb5080ce5734dab6173b
-
SHA512
3d206ec889f68e723be1753cdfa201b32697402e5395a0f6d92651419b31f7d9aae9e0a9170371671edc96b38e2b5761034fd41b35e7a1d510200e853b1bdee1
-
SSDEEP
1536:FRSJIlb/u3F1ErDMpoGLCWrx1XStibvD/r9TNwMbWAVnb2rxmk+VjgC:fSGlbCF1Ero2GlF1i8X/JRVKAhcx+r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6db94e3ecd232783aa528de6458983d
Files
-
d6db94e3ecd232783aa528de6458983d.exe windows:5 windows x86 arch:x86
46a81a84c6bb2c0a25fa3341c8ffe112
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
GetScrollPos
FrameRect
SetWindowPos
GetMessageA
EqualRect
GetSysColorBrush
UnhookWindowsHookEx
PostQuitMessage
EnableMenuItem
SetWindowTextA
GetSubMenu
GetSysColor
EnumWindows
kernel32
ExitProcess
RtlUnwind
VirtualAllocEx
QueryPerformanceCounter
InterlockedExchange
GetTempPathA
GetTimeZoneInformation
GetStartupInfoA
GetSystemTime
GetFileAttributesA
GetCurrentProcessId
SetUnhandledExceptionFilter
GetThreadLocale
FileTimeToSystemTime
gdi32
FillRgn
SetViewportExtEx
CopyEnhMetaFileA
CreateCompatibleBitmap
GetMapMode
ExcludeClipRect
CreateICW
SelectClipPath
DPtoLP
ole32
StringFromGUID2
StgOpenStorage
CoInitialize
CoTaskMemRealloc
OleRun
CoInitializeSecurity
DoDragDrop
CoRevokeClassObject
CoCreateInstance
advapi32
AdjustTokenPrivileges
FreeSid
GetUserNameA
RegQueryValueExW
QueryServiceStatus
CryptHashData
CheckTokenMembership
GetSecurityDescriptorDacl
RegCreateKeyExW
RegCreateKeyA
msvcrt
fprintf
puts
_flsbuf
_lock
_CIpow
strncpy
__initenv
__setusermatherr
fflush
strlen
_mbscmp
_fdopen
iswspace
__getmainargs
_strdup
raise
strcspn
signal
comctl32
ImageList_DragEnter
ImageList_SetIconSize
ImageList_LoadImageA
ImageList_Destroy
ImageList_GetIconSize
ImageList_LoadImageW
ImageList_Write
ImageList_GetBkColor
InitCommonControls
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_DrawEx
CreatePropertySheetPageA
shell32
ShellExecuteEx
ExtractIconW
SHGetPathFromIDList
SHBrowseForFolderA
DragAcceptFiles
DragQueryFileW
ShellExecuteW
CommandLineToArgvW
DoEnvironmentSubstW
DragQueryFileA
ExtractIconExW
oleaut32
SafeArrayPutElement
SafeArrayCreate
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetUBound
SafeArrayRedim
SysReAllocStringLen
SafeArrayUnaccessData
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE