Static task
static1
Behavioral task
behavioral1
Sample
1af5718b28c2158c39394a8a85c31f50N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1af5718b28c2158c39394a8a85c31f50N.exe
Resource
win10v2004-20240802-en
General
-
Target
1af5718b28c2158c39394a8a85c31f50N.exe
-
Size
203KB
-
MD5
1af5718b28c2158c39394a8a85c31f50
-
SHA1
4a704f6719b0b3a0fb73a73bfb7b4fb80ed6a463
-
SHA256
23177ce6f7db7500b3ae3e6069b1fee110b74308f79bd77928136ee36cbdb2e9
-
SHA512
ce0e054508b496a452cdc5cd2f7e85930b4377c479640a306d88e262abc0ec69f95285ebf0c8f8deaf10e96f97c1e835245564e7c4e343a5d9d9abe32e12cf2c
-
SSDEEP
3072:I1g2ZB+GEhO118/bPyKxM4QTJt2cWGsNPKisJoyjK7yGAe9Q0enyU8GZqaP+wPml:yhYzxMlNNsAisDRGAL0eyUBnPrPO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1af5718b28c2158c39394a8a85c31f50N.exe
Files
-
1af5718b28c2158c39394a8a85c31f50N.exe.exe windows:4 windows x86 arch:x86
3b42f9693bdd770281b738cfac146ecf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomW
lstrcpynW
GetModuleFileNameA
GetFileType
GetEnvironmentStringsA
GetProcAddress
BeginUpdateResourceW
GetCurrentThreadId
CreateMailslotW
AddAtomA
lstrlen
GetEnvironmentStringsW
GetExpandedNameA
WinExec
GetCurrentProcessId
GetThreadPriority
FindAtomA
OpenWaitableTimerW
GetModuleHandleA
GetLocaleInfoA
GetDateFormatA
GetShortPathNameW
user32
GetParent
CreateWindowExA
SetDlgItemTextW
DestroyIcon
GetDlgItemInt
IsWindow
IsMenu
PostMessageA
SetWindowLongW
GetWindowTextW
CallWindowProcW
GetCapture
GetSubMenu
InvalidateRect
DestroyWindow
GetDlgItem
WinHelpA
GetSystemMetrics
SetCursorPos
CreateCaret
CascadeWindows
EnumDesktopsA
GetDCEx
EndDialog
CreatePopupMenu
GetMessageA
GetCursorPos
CreateAcceleratorTableW
GetTopWindow
SetWindowRgn
SendMessageA
gdi32
ColorMatchToTarget
CreateCompatibleDC
Pie
CopyMetaFileW
ExtTextOutW
GetTextColor
SetColorAdjustment
CreatePatternBrush
SetMetaRgn
ExtFloodFill
GetEnhMetaFileDescriptionA
SetTextColor
ExtSelectClipRgn
AddFontResourceW
EndDoc
GetTextFaceW
GetCharacterPlacementA
GetMetaFileA
advapi32
RegOpenKeyW
RegFlushKey
RegOpenKeyA
shlwapi
GetMenuPosFromID
PathUnmakeSystemFolderA
UrlIsNoHistoryW
PathIsURLA
SHCreateShellPalette
PathRemoveArgsW
SHCopyKeyW
SHRegOpenUSKeyA
PathSearchAndQualifyW
Sections
.eX Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ah Size: 2KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wc Size: 512B - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cKgaFt Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JbcCcw Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ