Static task
static1
Behavioral task
behavioral1
Sample
2368126636647638cd5d1798be6911791f867e565ccdf921593b5e4313e3e0b5.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2368126636647638cd5d1798be6911791f867e565ccdf921593b5e4313e3e0b5.exe
Resource
win10v2004-20230703-en
General
-
Target
2368126636647638cd5d1798be6911791f867e565ccdf921593b5e4313e3e0b5
-
Size
53KB
-
MD5
f739d9ebbdc171e92990dd4716799209
-
SHA1
19a8d19919552ee3398da9c6b3325765c55a0666
-
SHA256
2368126636647638cd5d1798be6911791f867e565ccdf921593b5e4313e3e0b5
-
SHA512
7059a9af4500276c2810566312c959725bc89786dbe32d7edf3f9b7beca8bdc7dfc99837566045e10cfedab45a387b09cde07804a0b951331cc56bd0451379c0
-
SSDEEP
1536:muafD1fdUXdZkXLz7VfJgIKSRVSkW5gfsI019EUbN:rW1fdUtZ3tR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2368126636647638cd5d1798be6911791f867e565ccdf921593b5e4313e3e0b5
Files
-
2368126636647638cd5d1798be6911791f867e565ccdf921593b5e4313e3e0b5.exe windows x86
788d7da136d5e605ca45df4a4a33ccb7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
IsTextUnicode
kernel32
DeleteCriticalSection
EnterCriticalSection
FillConsoleOutputCharacterW
FindResourceExW
FlushFileBuffers
FormatMessageW
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileType
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetSystemTimeAsFileTime
GetTickCount
GlobalAlloc
GlobalFree
GlobalLock
GlobalReAlloc
GlobalSize
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LoadResource
LocalFree
LockResource
QueryPerformanceCounter
ReadFile
RtlUnwind
SetConsoleCursorPosition
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteConsoleW
WriteFile
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnwprintf
_wcmdln
abort
calloc
exit
fprintf
free
fwrite
malloc
memmove
signal
strncmp
vfprintf
wcslen
wcsncmp
user32
CloseClipboard
EmptyClipboard
OpenClipboard
SetClipboardData
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 740B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 28KB - Virtual size: 28KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ