Static task
static1
Behavioral task
behavioral1
Sample
02963b741523e212f434ccbcb1216fec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02963b741523e212f434ccbcb1216fec.exe
Resource
win10v2004-20231222-en
General
-
Target
02963b741523e212f434ccbcb1216fec
-
Size
408KB
-
MD5
02963b741523e212f434ccbcb1216fec
-
SHA1
629c3e0baf00e7ec1b73bdfa43d1eadb2a86395d
-
SHA256
6033ada63e077d820129968ace6ada2175478f51cd7215230709d90d841d7ad3
-
SHA512
e2e0b931585438285da26c7f89d0e160117691b96944a02eb8bae50eb5af7156692e68c4cfa20b7541706bd5ed758c60f7ae335455e66f52d7616252f0c6e737
-
SSDEEP
12288:lfUCjSXrQ7hClo5yUkRT46CPcfBloClg9:lfUCyrQ7Oo51kRkYJFg9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02963b741523e212f434ccbcb1216fec
Files
-
02963b741523e212f434ccbcb1216fec.exe windows:61388 windows x86 arch:x86
10ed7b9d461e5557cd6daf0d30ecc7b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadImageW
CheckDlgButton
LoadAcceleratorsW
FindWindowW
DestroyWindow
RegisterClassW
EnableMenuItem
GetParent
wsprintfA
RegisterClassW
LoadCursorW
kernel32
VirtualAlloc
SetUnhandledExceptionFilter
SetEvent
GetTickCount
VirtualAlloc
ExitProcess
GetCommandLineA
CreateThread
LoadLibraryExW
WaitForSingleObject
gdi32
GetTextExtentPoint32W
DeleteDC
SetBkMode
SetTextColor
GetDeviceCaps
SelectObject
DeleteObject
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 388KB - Virtual size: 964KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ