Static task
static1
Behavioral task
behavioral1
Sample
0624cfcadfe5d1dd4c8f6157aea26b3f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0624cfcadfe5d1dd4c8f6157aea26b3f.exe
Resource
win10v2004-20231215-en
General
-
Target
0624cfcadfe5d1dd4c8f6157aea26b3f
-
Size
193KB
-
MD5
0624cfcadfe5d1dd4c8f6157aea26b3f
-
SHA1
d4605b594e4e858fd589c21ea1581c2ea1b1c720
-
SHA256
8e69cd986c9a485f7c45f6a52d0ced5708b78088408d9a7f3f2a8a88ef9258ba
-
SHA512
e40b3345c8f18f3d7f20a9bd7b004e2a30026ca5daea1794cac488860e18af72e396b770859442ea3c07d9e529a5e3271eda5f1163c53a16710c93692569f836
-
SSDEEP
3072:4XW5RMwdgqZk+YK5hLYXcf/YCXRmuAuRt2+7lonjPFYaCuD5in01+htA:QW5RMOhrVf/DRauRHlwrFYaN5inon
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0624cfcadfe5d1dd4c8f6157aea26b3f
Files
-
0624cfcadfe5d1dd4c8f6157aea26b3f.exe windows:4 windows x86 arch:x86
63bcbf32efb874107897cc0027dba46f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
FindAtomW
GetNumberFormatW
GetCurrentProcessId
EnumCalendarInfoW
EnterCriticalSection
GetCurrentThreadId
GetConsoleAliasW
SetLastError
ReadFile
lstrlenW
FindClose
CreateEventW
GetDriveTypeW
GetModuleHandleA
SetEvent
GetPrivateProfileStringW
TlsGetValue
LocalFree
HeapCreate
user32
GetKeyState
GetSysColor
GetMenuInfo
DispatchMessageA
GetClassInfoA
GetKeyboardType
CallWindowProcW
DispatchMessageA
GetCursorInfo
SetFocus
GetClientRect
IsWindow
DrawTextA
wsnmp32
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 492KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 358KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ