Static task
static1
Behavioral task
behavioral1
Sample
167e6b8d588616127caaa8991129a769.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
167e6b8d588616127caaa8991129a769.exe
Resource
win10v2004-20231215-en
General
-
Target
167e6b8d588616127caaa8991129a769
-
Size
60KB
-
MD5
167e6b8d588616127caaa8991129a769
-
SHA1
c529b8bd7fcd3686db799cbd4448cf88a3b22b93
-
SHA256
e03325ecca2472276ef96b8859fbaada90e6376da3c7d79ae91ddb28b0884718
-
SHA512
9a837d898836a59e6a6f83a3aa35e846783d8add96e83bd062b75f0e9912217643401e2c99aed9c546f057558f6147a3a9f3214e29ba9abe1af50e47958b607d
-
SSDEEP
768:4yxGlgPO2K080wgqAojtP0kwEYw9zWudzJZ+/yuA2tFGv:iliORDwEYmz7Nfvu/tov
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 167e6b8d588616127caaa8991129a769
Files
-
167e6b8d588616127caaa8991129a769.exe windows:4 windows x86 arch:x86
0563c59718d780ad5af0145916a3575b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
CreateThread
GetProcAddress
GetModuleHandleA
GetCurrentProcess
SetFileAttributesA
CopyFileA
GetModuleFileNameA
GetTickCount
CloseHandle
GetFileSize
CreateFileA
LoadLibraryA
GetCommandLineA
ExitProcess
lstrcpyA
CreateMutexA
ExitThread
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
Process32Next
CreateToolhelp32Snapshot
GetVersionExA
GetFileAttributesA
ExpandEnvironmentStringsA
GetStringTypeA
LCMapStringW
CreateProcessA
Sleep
GetLastError
TerminateProcess
GetStringTypeW
LCMapStringA
MultiByteToWideChar
ReadFile
SetEndOfFile
GetStartupInfoA
GetVersion
HeapFree
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
HeapAlloc
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
user32
wsprintfA
advapi32
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
shell32
SHGetFolderPathA
shlwapi
PathAppendA
StrStrA
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE