Static task
static1
Behavioral task
behavioral1
Sample
0b486a779be546651a6ce2e367fa8eeaadc00065fdbb69f4291aca1f517ad17f.exe
Resource
win7-20230712-en
General
-
Target
0b486a779be546651a6ce2e367fa8eeaadc00065fdbb69f4291aca1f517ad17f
-
Size
1.5MB
-
MD5
abfa57df093de5d5dcf5ece4ac20c1f6
-
SHA1
12155ae64f5e7932b4e9211a67def119492ce805
-
SHA256
0b486a779be546651a6ce2e367fa8eeaadc00065fdbb69f4291aca1f517ad17f
-
SHA512
1e28d844c73f5c5d71f548c1090b8b79b7eca77f6d242ccd7239435e86747daeff9ebe1c3e16a86b2690f66be80d3caeba7f9095b91b01562a4d2495dc514dda
-
SSDEEP
24576:Dx4eUu0BlOj/vNozPquEnevKBWja41t6nlS+z+nNZkzWlWY8g7lMBqbeF+W6or8J:DdX0Kj3+zSvdB34Pd+zSnLl1BtRV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b486a779be546651a6ce2e367fa8eeaadc00065fdbb69f4291aca1f517ad17f
Files
-
0b486a779be546651a6ce2e367fa8eeaadc00065fdbb69f4291aca1f517ad17f.exe windows x86
f1e441b9bde5ac576d3ac9d255c03f0a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
winmm
midiStreamRestart
ws2_32
WSACleanup
kernel32
CreateSemaphoreA
user32
GetClipboardData
gdi32
GetViewportExtEx
winspool.drv
OpenPrinterA
advapi32
RegQueryValueA
shell32
Shell_NotifyIconA
ole32
OleRun
oleaut32
VariantInit
comctl32
ImageList_Destroy
wininet
InternetCloseHandle
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 472KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 984KB - Virtual size: 984KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ