Static task
static1
Behavioral task
behavioral1
Sample
26619b4af9272d83a4f259ffd4682f2cba9285285d86e287e8b5517568e1180e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
26619b4af9272d83a4f259ffd4682f2cba9285285d86e287e8b5517568e1180e.exe
Resource
win10v2004-20240802-en
General
-
Target
26619b4af9272d83a4f259ffd4682f2cba9285285d86e287e8b5517568e1180e
-
Size
105KB
-
MD5
dbbc6758811d14653b9d4f1ed0b5a890
-
SHA1
a234f7e43d637b9f9a1b161db64668c65ee24a9a
-
SHA256
26619b4af9272d83a4f259ffd4682f2cba9285285d86e287e8b5517568e1180e
-
SHA512
bafc00bae82efad9f0b49ced9a641aaba11de705a2438e82a47c4a95337af80731af7814c075055ccbddc978883a25b71ee9800e5c03ca638fb380fa6c1df30e
-
SSDEEP
1536:MDssK0W7Dy5HEkn8OTdh8BATHSNjffd+k/v3gx3fKvtbHUpcposmo7ZM4e2:MDZxnTdTcAxvK5ocpvmoqb2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26619b4af9272d83a4f259ffd4682f2cba9285285d86e287e8b5517568e1180e
Files
-
26619b4af9272d83a4f259ffd4682f2cba9285285d86e287e8b5517568e1180e.exe windows:4 windows x86 arch:x86
e3375863abbd62135baac702f4deff18
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetCurrentDirectoryA
GetShortPathNameA
FindResourceExA
EnumResourceLanguagesA
ResumeThread
WriteProcessMemory
LocalFree
GetCurrentThreadId
SetFileAttributesA
CreateDirectoryA
QueryPerformanceCounter
QueryPerformanceFrequency
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetProcAddress
InitializeCriticalSection
HeapValidate
lstrcatA
WideCharToMultiByte
RtlUnwind
GetStringTypeW
user32
SetFocus
AdjustWindowRectEx
DefWindowProcA
advapi32
RegCreateKeyA
RegSetValueA
RegCloseKey
ole32
CoRegisterClassObject
ReadClassStm
Sections
0 Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
1 Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
2 Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 48KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
6 Size: 10KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE