Static task
static1
Behavioral task
behavioral1
Sample
0282d9000d864edb3daf234aaefb3cbe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0282d9000d864edb3daf234aaefb3cbe.exe
Resource
win10v2004-20231222-en
General
-
Target
0282d9000d864edb3daf234aaefb3cbe
-
Size
121KB
-
MD5
0282d9000d864edb3daf234aaefb3cbe
-
SHA1
d197ebb551ac45192a00a0a6d61b70fc3e799cb0
-
SHA256
7de41d26d750598fa7503c2cc1ce62c7d5b37ce21220387bd678b93e5b51e4e7
-
SHA512
89348cef09626496f6121d3838145104360a8f0f76c5436ba332a593641922291dbebc5e11ef7a4189041c605d6fcb929a8c4206c951339525cd938aa7f99ccf
-
SSDEEP
768:Mywwo3l5ZHzVoypmAOoEqCbRZrXmafum0+Yarck+xf2QvydLRbbXwpYh6ODBjF+U:GTflzVoUmAPyZ9T3+xfc7vh6OdjwU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0282d9000d864edb3daf234aaefb3cbe
Files
-
0282d9000d864edb3daf234aaefb3cbe.exe windows:5 windows x86 arch:x86
da1b22a8b822889890c9b1386ccca77b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
ExitProcess
HeapAlloc
advapi32
RegCreateKeyA
RegCreateKeyA
RegCreateKeyExW
RegOpenKeyW
RegCreateKeyA
RegOpenKeyA
RegQueryValueW
user32
GetScrollPos
CopyImage
GetScrollInfo
EndDialog
DialogBoxParamA
EndDialog
CopyImage
InsertMenuA
GetScrollInfo
CopyIcon
Sections
.hgcc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.imied Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kellg Size: 73KB - Virtual size: 381KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kkplh Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ojmd Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 571B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ