Static task
static1
Behavioral task
behavioral1
Sample
1493bcead7d52cc42f82f5f3d0a7624b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1493bcead7d52cc42f82f5f3d0a7624b.exe
Resource
win10v2004-20231215-en
General
-
Target
1493bcead7d52cc42f82f5f3d0a7624b
-
Size
285KB
-
MD5
1493bcead7d52cc42f82f5f3d0a7624b
-
SHA1
be1693d1d3c90ccea7e55f412c1827a5e385cfc1
-
SHA256
56fe5cc090a1fdf925ed2b28a67608a07a95f48d340eafd32058e105faf76125
-
SHA512
3116c124de43ee2d3873a08cb6c578c42eb11436209e8a428e9999c41000b24161ec575fcfbf129ba15d9382716a506e0072cbbdde5322f55575b38025244698
-
SSDEEP
6144:CWBRxSp6Ytv4mI2mSK+QIBNyd/Qd9FJsW3t:CWBRxSp82mSBQd/Apd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1493bcead7d52cc42f82f5f3d0a7624b
Files
-
1493bcead7d52cc42f82f5f3d0a7624b.exe windows:5 windows x86 arch:x86
e150a0f4166b7e820bdcca54966771c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
WriteFile
GlobalAlloc
Sleep
CreateEventA
TransactNamedPipe
VerifyVersionInfoA
FileTimeToSystemTime
GetMailslotInfo
ReadFile
GetSystemDirectoryA
CreateDirectoryA
GetLastError
WaitNamedPipeA
GlobalFree
LoadLibraryA
GetSystemInfo
SetNamedPipeHandleState
SetEnvironmentVariableA
GetModuleFileNameA
CreateMailslotA
GetFileTime
CloseHandle
FindResourceA
LoadResource
SizeofResource
LockResource
VerSetConditionMask
SystemTimeToTzSpecificLocalTime
FreeLibrary
lstrlenA
CreateFileA
GetProcAddress
GetComputerNameA
SetEndOfFile
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
OutputDebugStringW
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThreadId
MultiByteToWideChar
ExitProcess
GetModuleHandleExW
AreFileApisANSI
WideCharToMultiByte
HeapSize
EnterCriticalSection
LeaveCriticalSection
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
RaiseException
HeapAlloc
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlUnwind
GetConsoleCP
GetConsoleMode
GetStringTypeW
LCMapStringW
LoadLibraryExW
HeapReAlloc
SetFilePointerEx
ReadConsoleW
advapi32
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
shell32
SHFileOperationA
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ