Static task
static1
Behavioral task
behavioral1
Sample
00aecdbfcc0f16696797f09747e0a502.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00aecdbfcc0f16696797f09747e0a502.exe
Resource
win10v2004-20231215-en
General
-
Target
00aecdbfcc0f16696797f09747e0a502
-
Size
169KB
-
MD5
00aecdbfcc0f16696797f09747e0a502
-
SHA1
d54781934d837a8f9439e7ea36bb6dc7acdd11a0
-
SHA256
6db75cf85feab6c98ee8f658583889792f680437d341a9beacc342635f1ef74f
-
SHA512
9fafbd008ec9ee4da96bff4ec6e4db3a5196e634abe8ca332f76c97c987b62280979d3b2658e3b30fa45510797b9af099190d0dd047dde0a02b030e4b746cefd
-
SSDEEP
3072:d3Tqkv8xU+b2EhfhfI8PTjYZ12He2ueo8CdQ6cuDI+WR+W2aXroUMKp+iGKpM:d3Tq1xU+hhfhA8PoZYueZC3D279MKtGK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00aecdbfcc0f16696797f09747e0a502
Files
-
00aecdbfcc0f16696797f09747e0a502.exe windows:4 windows x86 arch:x86
92554c99a51423f2b1f3635592b8088d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetIpAddrTable
shell32
SHGetFolderPathW
newdev
UpdateDriverForPlugAndPlayDevicesW
mprapi
MprConfigServerConnect
MprConfigServerDisconnect
MprConfigGetFriendlyName
kernel32
AddAtomA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
GetOEMCP
EnumResourceLanguagesA
FreeEnvironmentStringsA
GetNumberFormatW
UnhandledExceptionFilter
GetStartupInfoA
GetCPInfo
SetUnhandledExceptionFilter
user32
GetDlgItem
SendMessageA
CreateWindowExW
DestroyWindow
IsWindow
EnumChildWindows
GetWindowThreadProcessId
setupapi
CM_Get_Parent
CMP_WaitNoPendingInstallEvents
SetupDiGetDeviceRegistryPropertyW
CM_Get_DevNode_Status
Sections
.text Size: 89KB - Virtual size: 484KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ