Static task
static1
Behavioral task
behavioral1
Sample
03b3a9252d3017696639ab0af46050e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03b3a9252d3017696639ab0af46050e4.exe
Resource
win10v2004-20231215-en
General
-
Target
03b3a9252d3017696639ab0af46050e4
-
Size
21KB
-
MD5
03b3a9252d3017696639ab0af46050e4
-
SHA1
c6d7ca1573202feb36e11558046958e95f94ecd9
-
SHA256
7244f0a44b49472d4eb3215fc37e735b60276d29d454c5116320a2f6f17b2d46
-
SHA512
7a3fc12e032e6451690ce4f06c7dc2158efb5629b05b4c1817657e9c68849cff55ffe5a9b1f9c8a9c0b2745c6bf02521aafb2a914f4d53e5f8ff3477d092155a
-
SSDEEP
384:EmaNThruO/Ln27MNeLNek+vDtwO049M1bUdM6mjIsD433dI:EThrNLn2EnobUOljPD1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03b3a9252d3017696639ab0af46050e4
Files
-
03b3a9252d3017696639ab0af46050e4.exe windows:4 windows x86 arch:x86
5bdbd2a8c485658897a17cc1d32b9952
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceA
HeapDestroy
GetModuleHandleA
Sleep
GetConsoleFontSize
VirtualProtect
GetTickCount
FindResourceExA
SearchPathA
ExitProcess
AddAtomA
ReleaseMutex
CreateThread
TlsGetValue
SetEvent
FindVolumeClose
lstrlenA
DeleteCriticalSection
CloseHandle
GetLastError
user32
DispatchMessageA
CopyIcon
DialogBoxParamA
DragDetect
CopyImage
CreateMenu
EnableWindow
IsIconic
CreateWindowExA
GetScrollBarInfo
GetMessageA
CloseWindow
GetKeyState
EndDialog
hlink
HlinkResolveShortcut
HlinkTranslateURL
HlinkIsShortcut
HlinkClone
HlinkNavigate
shell32
DragQueryFileA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ