Static task
static1
Behavioral task
behavioral1
Sample
a23ba7bd883c07bc35774c7ba3235cce20c547314f1950a0954daeb270b4d3c9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a23ba7bd883c07bc35774c7ba3235cce20c547314f1950a0954daeb270b4d3c9.exe
Resource
win10v2004-20241007-en
General
-
Target
a23ba7bd883c07bc35774c7ba3235cce20c547314f1950a0954daeb270b4d3c9
-
Size
58KB
-
MD5
3ce7e6b718a4763a7c88c06f633f78e9
-
SHA1
5dd8256f040a8626044cb7e1638ff60aa055d0e3
-
SHA256
a23ba7bd883c07bc35774c7ba3235cce20c547314f1950a0954daeb270b4d3c9
-
SHA512
1db5072c249f826df772adc76d6c7de958ca406e7402bef4148d43a3fe31a458a5fc1a3e8af93cbacfdbe8af22dc6ddf83c3af2978a0161c9f94c0780465676a
-
SSDEEP
1536:AkEqFY6xgFoB7qUbMUtatrMaOqSvryicFYFje+:AmYc4zMcSvr6YFje+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a23ba7bd883c07bc35774c7ba3235cce20c547314f1950a0954daeb270b4d3c9
Files
-
a23ba7bd883c07bc35774c7ba3235cce20c547314f1950a0954daeb270b4d3c9.exe windows:1 windows x86 arch:x86
9a6eb1696d2af8df0f91d695f9f57243
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellAboutA
kernel32
GlobalUnlock
GlobalAlloc
GlobalReAlloc
GlobalSize
GlobalCompact
GlobalFree
GlobalLock
lstrlenA
lstrcatA
WriteProfileStringA
GetModuleHandleA
GetStartupInfoA
GetEnvironmentStrings
GetCommandLineA
Sleep
lstrcmpA
GetProfileStringA
UnhandledExceptionFilter
GetModuleFileNameA
GetACP
GetOEMCP
GetCPInfo
GetStdHandle
GetFileType
VirtualFree
VirtualAlloc
RaiseException
MultiByteToWideChar
WideCharToMultiByte
GetProcAddress
GetLastError
LocalAlloc
LocalReAlloc
lstrcpyA
GetProfileIntA
GetTickCount
LocalFree
GetVersion
ExitProcess
RtlUnwind
user32
WinHelpA
GetDC
GetWindowRect
CreateDialogParamA
CheckRadioButton
LoadStringA
RegisterClassExA
GetSysColorBrush
LoadCursorA
LoadIconA
SetDlgItemTextA
GetDlgItem
FillRect
SetRect
CheckMenuItem
GetSubMenu
GetMenu
SetWindowPos
MapDialogRect
InvalidateRect
SetFocus
IsIconic
GetSysColor
DestroyMenu
TrackPopupMenuEx
LoadMenuA
ReleaseCapture
SetCapture
GetDlgCtrlID
EnableMenuItem
IsClipboardFormatAvailable
ReleaseDC
ScreenToClient
DestroyWindow
PostQuitMessage
DefWindowProcA
MessageBeep
GetWindowTextA
DrawFrameControl
GetClientRect
ShowCursor
SetCursor
EndPaint
DrawEdge
BeginPaint
CloseClipboard
CharUpperA
GetClipboardData
OpenClipboard
SetWindowTextA
EnableWindow
CheckDlgButton
ShowWindow
UpdateWindow
CreateWindowExA
SendMessageA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
IsDialogMessageA
DispatchMessageA
MessageBoxA
gdi32
GetStockObject
GetDeviceCaps
GetTextMetricsA
SetTextColor
SetBkColor
TextOutA
GetTextExtentPointA
SetBkMode
SelectObject
DeleteObject
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ