Static task
static1
Behavioral task
behavioral1
Sample
135b287c05a648b4a07a83b46d50edca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
135b287c05a648b4a07a83b46d50edca.exe
Resource
win10v2004-20231215-en
General
-
Target
135b287c05a648b4a07a83b46d50edca
-
Size
177KB
-
MD5
135b287c05a648b4a07a83b46d50edca
-
SHA1
5b4b5398ef9e3c8210ca91a6d1c80fa8f26f8e97
-
SHA256
b54eeb7b26229d8e7adc489b61c1429cd1e1d73bddfcb0c517df00e6cc7b465e
-
SHA512
a7fc996f31c6646d64af89ce80f43a2af0b6a54844799b8f1b2572c3d6feeb8499702fac6100262fa193ccdd819cc695d11552343f96f9c2784ee3368aaf9f76
-
SSDEEP
3072:cq6rbYyUnKoufGLfzD5ScTI2knTfQJjVykauL8ZlQFetiwDS:deZUn4GvwhfTWZzx8jGBw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 135b287c05a648b4a07a83b46d50edca
Files
-
135b287c05a648b4a07a83b46d50edca.exe windows:4 windows x86 arch:x86
4acfd73c6bfc68ac5c662418a6b3a3d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameA
GetTempPathA
GetVersionExA
GetVersion
GetFileSizeEx
GetProcAddress
LoadLibraryA
SetFileAttributesA
GetCurrentThreadId
lstrlenA
IsBadReadPtr
SetUnhandledExceptionFilter
RaiseException
SetStdHandle
LCMapStringW
LCMapStringA
SetFilePointer
FlushFileBuffers
GetCurrentDirectoryA
CloseHandle
GetModuleHandleA
GetLastError
ReadFile
FormatMessageA
GetOEMCP
GetACP
IsBadCodePtr
LocalAlloc
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
HeapAlloc
TerminateProcess
GetCurrentProcess
HeapSize
HeapFree
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
VirtualAlloc
IsBadWritePtr
user32
CopyImage
wsprintfA
LoadBitmapA
IsClipboardFormatAvailable
EmptyClipboard
OpenClipboard
GetWindowWord
GetWindowThreadProcessId
GetDC
gdi32
GetObjectType
DeleteDC
SetTextColor
GetDIBits
CreateBrushIndirect
comdlg32
FindTextA
advapi32
GetUserNameA
shlwapi
PathFileExistsA
PathGetCharTypeA
PathAppendA
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE