Static task
static1
Behavioral task
behavioral1
Sample
15a60970a5800d5beb69086a784f256a5cb23515d07b2f91bd88ac6dc3d5fd83.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
15a60970a5800d5beb69086a784f256a5cb23515d07b2f91bd88ac6dc3d5fd83.exe
Resource
win10v2004-20230703-en
General
-
Target
15a60970a5800d5beb69086a784f256a5cb23515d07b2f91bd88ac6dc3d5fd83
-
Size
2.7MB
-
MD5
1928c7c173c9fbd56ba3cd2e9af0e3d0
-
SHA1
c0555fbcc88532fb2b245c8fa0bbd4f1b12a45e7
-
SHA256
15a60970a5800d5beb69086a784f256a5cb23515d07b2f91bd88ac6dc3d5fd83
-
SHA512
7b610ee9cb30c7b1d36276665b2212e2738a97254b6575332d832071e72906587595838c1138647b86008ef8eba8cc11b371a9041e2946e7fddfae61245d8f80
-
SSDEEP
49152:/c1FjO7QmYl5Ckjuf7SDQjmu3RVHbt+xqlYC1ueK7S:/c1Fj8Yljuf7S0jBRRt+gXIX7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15a60970a5800d5beb69086a784f256a5cb23515d07b2f91bd88ac6dc3d5fd83
Files
-
15a60970a5800d5beb69086a784f256a5cb23515d07b2f91bd88ac6dc3d5fd83.exe windows x86
baa93d47220682c04d92f7797d9224ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrcpy
comctl32
InitCommonControls
Sections
Size: 743KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 137KB - Virtual size: 676KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ukfbjibf Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
foiaobkg Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE