Static task
static1
Behavioral task
behavioral1
Sample
Malicious_0c3201512437f60cf2efb785743e546b80bfdf6e37dffb9440f78a249d060c17.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Malicious_0c3201512437f60cf2efb785743e546b80bfdf6e37dffb9440f78a249d060c17.exe
Resource
win10v2004-20230703-en
General
-
Target
Malicious_0c3201512437f60cf2efb785743e546b80bfdf6e37dffb9440f78a249d060c17.dontrunthis
-
Size
2.2MB
-
MD5
d1dc2520b408d23c012171154fd937af
-
SHA1
72d603505e35d372a11553189277dba25a798b1c
-
SHA256
d4084315fdbf76d4565f18cf1fa13ae79a6c6e4f7eee13b709ed3d75e34b16b7
-
SHA512
5c126f4f8ef46fc2545e6f283e93ff0c1caec923e800cc665c1ec5794648f2b47b10eba37d42af99c5b52fc1475e37cfbc1b51ffea7dc71f71c480c583c81d8d
-
SSDEEP
49152:HoTvYaFDwj0/THHef0TEBJ8M5gGB4BOPxxKyIDM0REU8D:+Yzief0TEY7GCsIRD+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Malicious_0c3201512437f60cf2efb785743e546b80bfdf6e37dffb9440f78a249d060c17.dontrunthis
Files
-
Malicious_0c3201512437f60cf2efb785743e546b80bfdf6e37dffb9440f78a249d060c17.dontrunthis.exe windows x86
25355753c150aa2006916e7e151516f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CancelTimerQueueTimer
InterlockedExchange
GetCurrentProcessId
GetUserDefaultLCID
GetSystemTimeAsFileTime
CloseHandle
DeactivateActCtx
GetCurrentProcess
EnumDateFormatsExW
GetModuleHandleW
GetConsoleNlsMode
FatalExit
VirtualAlloc
GetCurrentThreadId
PurgeComm
LeaveCriticalSection
TerminateProcess
GetLastError
ClearCommBreak
CreateMutexW
MoveFileA
GetFileSize
ExitThread
DeleteCriticalSection
CreateFileW
AllocConsole
GetTempPathW
OpenEventW
DeleteTimerQueue
OpenConsoleW
FindAtomW
WideCharToMultiByte
ExitProcess
BeginUpdateResourceW
CreateMemoryResourceNotification
SetUnhandledExceptionFilter
GetConsoleCP
AddAtomW
CancelIo
EnterCriticalSection
CopyFileA
msvcrt
_atoldbl
_assert
_cgets
_cgetws
_cabs
_beep
_atoi64
_close
_access
_chdir
ws2_32
WSACleanup
accept
listen
WSAStartup
closesocket
bind
socket
WSALookupServiceNextA
select
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE