Static task
static1
Behavioral task
behavioral1
Sample
01484683fb9bcfc49a8bd4d7057ab90a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01484683fb9bcfc49a8bd4d7057ab90a.exe
Resource
win10v2004-20231215-en
General
-
Target
01484683fb9bcfc49a8bd4d7057ab90a
-
Size
68KB
-
MD5
01484683fb9bcfc49a8bd4d7057ab90a
-
SHA1
c612cff5fb4acb974599eb35b0196882bd5ef8c1
-
SHA256
0ac290714b2052fd46179ccf0f74a9ed1594d3ce5e9ebd17ea5f97720ca82a73
-
SHA512
9f1c6e3bc23e37a1ebc4cb4604428704966d4dcf5ef0f261329a9c059f12fffdfa107203adc9f58ef98845ccd664544248500e81ae81f800723f362959e99501
-
SSDEEP
768:i4LyGnxwPynpw5ggMZq0fKJhyEKuLlGiqrEgX9imke0/iFpuxY:iQyGYyq08KuLlGPXwFiFpuxY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01484683fb9bcfc49a8bd4d7057ab90a
Files
-
01484683fb9bcfc49a8bd4d7057ab90a.exe windows:4 windows x86 arch:x86
0745691935d729778cfaf0b53a370827
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
GetFileTime
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetTempPathA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
GetComputerNameA
MoveFileA
ReadFile
SetFilePointer
Sleep
TerminateProcess
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
GetCommandLineA
ExitProcess
CloseHandle
DeleteFileA
CreateThread
CreateMutexA
CreateFileA
CreateDirectoryA
LoadLibraryA
user32
FindWindowA
GetAsyncKeyState
GetClipboardData
GetForegroundWindow
GetKeyState
GetMessageA
GetWindowTextA
GetWindowThreadProcessId
LoadBitmapA
LoadCursorA
LoadIconA
MessageBoxA
MsgWaitForMultipleObjects
OpenClipboard
PostQuitMessage
RegisterClassExA
SendMessageA
SetFocus
ShowWindow
TranslateMessage
UpdateWindow
EnableWindow
DispatchMessageA
DefWindowProcA
CreateWindowExA
CloseClipboard
CharUpperBuffA
CharLowerA
wsprintfA
CharToOemA
gdi32
CreateFontIndirectA
advapi32
RegQueryValueExA
GetUserNameA
RegCloseKey
RegOpenKeyExA
comctl32
ord17
wsock32
connect
gethostbyname
htons
recv
send
socket
closesocket
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ