Static task
static1
Behavioral task
behavioral1
Sample
1da0d26791a1836665517534ba8446655ed045997d14fec17689983acf6ffefa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1da0d26791a1836665517534ba8446655ed045997d14fec17689983acf6ffefa.exe
Resource
win10v2004-20240508-en
General
-
Target
1da0d26791a1836665517534ba8446655ed045997d14fec17689983acf6ffefa
-
Size
1.4MB
-
MD5
7a45eb5996c9f9b1304f661590832212
-
SHA1
b502a663cb14071a2254cfff09428ba5d9639817
-
SHA256
1da0d26791a1836665517534ba8446655ed045997d14fec17689983acf6ffefa
-
SHA512
495b33fde88685a3b956277710ba97ad54658a1b91f29a5642d641effd89b6415c9b2e8f771b97fb3737cb021b5f76fc8017dca20c91401b00743da4213388b1
-
SSDEEP
24576:NNKJTXbbwYWyy0Jk6IWtkpw0Cyp+SgU/QFOzXW3DNf3mcbmTPWPUYtweHV+usK4O:PKJTXAak6IWtkpw0Cyp+SgU/QFOb3xSD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1da0d26791a1836665517534ba8446655ed045997d14fec17689983acf6ffefa
Files
-
1da0d26791a1836665517534ba8446655ed045997d14fec17689983acf6ffefa.exe windows:4 windows x86 arch:x86
2105ef12f12909f97e833064226f8e95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
GetFileAttributesA
GetFullPathNameA
GetSystemTime
FileTimeToSystemTime
GetTimeZoneInformation
GetProcAddress
LoadLibraryA
AreFileApisANSI
CloseHandle
GetLastError
WaitForSingleObject
GetExitCodeProcess
OpenProcess
FreeLibrary
GetStdHandle
GetConsoleMode
Sleep
VerSetConditionMask
IsWow64Process
FormatMessageA
GetProfileStringA
VerifyVersionInfoW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateDirectoryA
CreateFileA
DeleteFileA
RemoveDirectoryA
SetFileTime
FlushFileBuffers
GetFileSizeEx
GetFileTime
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
ExitProcess
TlsAlloc
TlsGetValue
TlsSetValue
LocalAlloc
LocalFree
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
OpenFileMappingA
GetPrivateProfileIntA
GetEnvironmentVariableA
WritePrivateProfileStringA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
CreateEventA
WaitForMultipleObjects
IsBadWritePtr
GetSystemTimeAsFileTime
FindClose
FindFirstFileA
FindNextFileA
ReleaseSemaphore
CreateSemaphoreA
OpenSemaphoreA
FlushInstructionCache
VirtualProtect
DeviceIoControl
LockFile
UnlockFile
IsBadStringPtrA
IsBadStringPtrW
GetDriveTypeA
WideCharToMultiByte
MultiByteToWideChar
MapViewOfFileEx
ReleaseMutex
CreateMutexA
SwitchToThread
GetProcessTimes
SetEnvironmentVariableA
ReadConsoleW
CreateFileW
WriteConsoleW
SetStdHandle
OutputDebugStringW
SetFilePointerEx
GetCurrentProcess
GetConsoleCP
HeapReAlloc
GetModuleFileNameW
GetOEMCP
IsValidCodePage
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
IsBadReadPtr
GetComputerNameA
GetWindowsDirectoryA
GetSystemDirectoryA
GetSystemInfo
SetLastError
GetModuleHandleA
GetModuleFileNameA
VirtualQuery
SetPriorityClass
TlsFree
SetThreadPriority
GetCurrentThread
TerminateProcess
GetProcessHeap
HeapFree
HeapAlloc
GetCurrentDirectoryA
SetConsoleCtrlHandler
OpenEventA
SetEvent
GetACP
SystemTimeToFileTime
GetTempPathA
GetLocalTime
GetDiskFreeSpaceA
GetUserDefaultUILanguage
GetExitCodeThread
GetCurrentThreadId
DuplicateHandle
GetTickCount
GetVersionExA
GetVersion
GetCurrentProcessId
GetPrivateProfileStringA
IsDebuggerPresent
LoadLibraryExW
GetCPInfo
GetModuleHandleExW
GetStartupInfoW
GetFileType
RtlUnwind
RaiseException
GetStringTypeW
DecodePointer
EncodePointer
user32
GetSystemMenu
AppendMenuA
LoadStringA
wsprintfA
DrawMenuBar
TranslateMessage
DispatchMessageA
GetSystemMetrics
MessageBoxA
CharLowerBuffA
CharUpperBuffA
CallMsgFilterA
PeekMessageA
shell32
ShellExecuteExA
advapi32
ReadEventLogA
StartServiceA
QueryServiceStatus
QueryServiceConfigA
OpenServiceA
OpenSCManagerA
CloseServiceHandle
RegFlushKey
RegDeleteKeyA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
GetUserNameA
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
OpenEventLogA
CloseEventLog
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
ws2_32
WSAStartup
freeaddrinfo
getaddrinfo
gethostname
WSACleanup
gethostbyname
sendto
recvfrom
inet_addr
bind
getpeername
WSAGetLastError
socket
shutdown
setsockopt
send
select
recv
getsockopt
ioctlsocket
connect
closesocket
accept
__WSAFDIsSet
gethostbyaddr
inet_ntoa
htons
Sections
__wibu00 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
__wibu01 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
__wibu02 Size: 4KB - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
__wibu03 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
__wibu04 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
__wibu05 Size: 48KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
__wibu06 Size: 92KB - Virtual size: 92KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE