Static task
static1
Behavioral task
behavioral1
Sample
cb4b26d66e6fe9eedee72271e6d1c0c786cbb2609c7c78e65731767e5d835ec4.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
cb4b26d66e6fe9eedee72271e6d1c0c786cbb2609c7c78e65731767e5d835ec4.exe
Resource
win10v2004-20240226-en
General
-
Target
cb4b26d66e6fe9eedee72271e6d1c0c786cbb2609c7c78e65731767e5d835ec4
-
Size
180KB
-
MD5
36690f98420a30ded290e38d3e70b447
-
SHA1
255288f2d8f075adcbddfd8307f57a6aa29d1e9a
-
SHA256
cb4b26d66e6fe9eedee72271e6d1c0c786cbb2609c7c78e65731767e5d835ec4
-
SHA512
2a18f77bee2f0052c7498faa63854b17c1fa8e19846e0855c71b993160b03d77a4d766c1ce7cccbc5e08a128cb49fdc6e8324a5177fe893aed5e155bd40b34e9
-
SSDEEP
3072:Iz9MPM+dT8DUmu4FtY5BQ33DFUrAQiToZL7vgCkcvHtJ:IsmVGBVAQvgCb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cb4b26d66e6fe9eedee72271e6d1c0c786cbb2609c7c78e65731767e5d835ec4
Files
-
cb4b26d66e6fe9eedee72271e6d1c0c786cbb2609c7c78e65731767e5d835ec4.exe windows:4 windows x86 arch:x86
cd16d3c37f412af442a17662c4227ca8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
db2app
sqlastrt@12
sqlaaloc@16
sqlasetda@24
sqlacall@20
sqlastop@4
sqlaintp_api@20
sqlabndx@16
kernel32
WritePrivateProfileStringA
GetProcessVersion
GetCPInfo
GetOEMCP
SetErrorMode
GetCurrentProcess
ReadFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetFileAttributesA
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetSystemTimeAsFileTime
SetConsoleCtrlHandler
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
ExitProcess
TerminateProcess
RaiseException
HeapSize
GetACP
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalFlags
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
SetLastError
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GetProcAddress
GlobalUnlock
GlobalFree
LocalFree
MultiByteToWideChar
WideCharToMultiByte
LocalAlloc
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetExitCodeProcess
TerminateThread
WriteFile
ResumeThread
WinExec
CreateFileA
ReleaseSemaphore
OpenSemaphoreA
CreateSemaphoreA
WaitForSingleObject
CreateThread
SetThreadPriority
GetLastError
CloseHandle
CreateProcessA
Sleep
GetStartupInfoA
user32
GetTopWindow
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SetWindowTextA
ShowWindow
ClientToScreen
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
DestroyWindow
GetDlgItem
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SetCursor
PostQuitMessage
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowA
IsWindowVisible
PostMessageA
MessageBoxA
IsIconic
GetSystemMetrics
GetClientRect
GetCapture
WinHelpA
wsprintfA
RegisterClassA
GetClassInfoA
DrawIcon
SendMessageA
EnableWindow
LoadIconA
GetMenuCheckMarkDimensions
GetCursorPos
UnregisterClassA
gdi32
SetBkColor
GetObjectA
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetTextColor
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetClipBox
CreateBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
comctl32
ord17
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ