Static task
static1
Behavioral task
behavioral1
Sample
1bd3156bfa4a20bd72cf908cf88a54ff99f49a51f6e55cb6d0cd979ce61bb5ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1bd3156bfa4a20bd72cf908cf88a54ff99f49a51f6e55cb6d0cd979ce61bb5ba.exe
Resource
win10v2004-20240226-en
General
-
Target
1bd3156bfa4a20bd72cf908cf88a54ff99f49a51f6e55cb6d0cd979ce61bb5ba
-
Size
152KB
-
MD5
b00ac5f9c6db54293a5470cc82d7e84a
-
SHA1
6882e464bfe68d8ffcac5c56cc5e4ee59bd2fb9e
-
SHA256
1bd3156bfa4a20bd72cf908cf88a54ff99f49a51f6e55cb6d0cd979ce61bb5ba
-
SHA512
e57ca6770b21f1c3860d491dbd2d755a3ad80155814d0de04a5bb8539d739f29bd2555e058acf8e02420aa186d5997f0c494cd1335428f8901f097a5ea38fc6b
-
SSDEEP
3072:jUtW0CF7p11L8CD1e42dN8taTcVtXnrrLYnSpXH9ZwqY5nj++++++++++++++++s:+WHp1FTMjcV9DYSpX9ZPg++++++++++w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1bd3156bfa4a20bd72cf908cf88a54ff99f49a51f6e55cb6d0cd979ce61bb5ba
Files
-
1bd3156bfa4a20bd72cf908cf88a54ff99f49a51f6e55cb6d0cd979ce61bb5ba.exe windows:4 windows x86 arch:x86
46025afcc3d05e23fc5745f68bd0334f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreateFileA
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
LoadLibraryA
LocalAlloc
LocalFree
VirtualProtect
GetModuleHandleW
shell32
SHGetFolderPathA
user32
GetDC
LoadAcceleratorsA
LoadCursorA
LoadIconA
RegisterClassW
ulib
??0ARGUMENT_LEXEMIZER@@QAE@XZ
??0ARRAY@@QAE@XZ
??0CLASS_DESCRIPTOR@@QAE@XZ
??0DSTRING@@QAE@XZ
??0FLAG_ARGUMENT@@QAE@XZ
??0PATH@@QAE@XZ
??0PROGRAM@@IAE@XZ
??1ARGUMENT_LEXEMIZER@@UAE@XZ
??1ARRAY@@UAE@XZ
??1DSTRING@@UAE@XZ
??1PATH@@UAE@XZ
??1PROGRAM@@UAE@XZ
?AppendBase@PATH@@QAEEPBVWSTRING@@E@Z
?Compare@OBJECT@@UBEJPBV1@@Z
?DisplayMessage@PROGRAM@@UBAEKW4MESSAGE_TYPE@@PADZZ
?DisplayMessage@PROGRAM@@UBEEKW4MESSAGE_TYPE@@@Z
?DoParsing@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Fatal@PROGRAM@@UBAXKKPADZZ
?Fatal@PROGRAM@@UBEXXZ
?GetStandardError@PROGRAM@@UAEPAVSTREAM@@XZ
?GetStandardInput@PROGRAM@@UAEPAVSTREAM@@XZ
?Initialize@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Initialize@ARRAY@@QAEEKK@Z
?Initialize@CLASS_DESCRIPTOR@@QAEEXZ
?IsValueSet@ARGUMENT@@QAEEXZ
?PrepareToParse@ARGUMENT_LEXEMIZER@@QAEEPAVWSTRING@@@Z
?Put@ARRAY@@UAEEPAVOBJECT@@@Z
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QAEXE@Z
?Usage@PROGRAM@@UBEXXZ
?ValidateVersion@PROGRAM@@UBEXKK@Z
??1OBJECT@@UAE@XZ
ntdll
RtlFreeHeap
RtlAllocateHeap
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 129KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 98B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.xdata Size: 512B - Virtual size: 113B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE