Static task
static1
Behavioral task
behavioral1
Sample
04f9e5d020e3ef2d6af0ce9e15f47f75.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04f9e5d020e3ef2d6af0ce9e15f47f75.exe
Resource
win10v2004-20231215-en
General
-
Target
04f9e5d020e3ef2d6af0ce9e15f47f75
-
Size
95KB
-
MD5
04f9e5d020e3ef2d6af0ce9e15f47f75
-
SHA1
68c3ae98023a7625c99430fa1b133cc011e44b90
-
SHA256
461bd1258cfe6559dd86d38069c18d0e7d9e66a2ea7d427b8bc2c5814f553f07
-
SHA512
478d6e9468b381d6306644b84e2a02ac64e2055d1fac08e1016bf3f0facaf04514f73f1fdcba904126b559609a43aeb346ab61d3568c54588de0e57dbaa9ab75
-
SSDEEP
1536:X2aIrSysK0EcewhJWRQsj2SWZ+njYADIGCRny4fAriBD:XyrS1VvJmQ658+njYwYy4gQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04f9e5d020e3ef2d6af0ce9e15f47f75
Files
-
04f9e5d020e3ef2d6af0ce9e15f47f75.exe windows:4 windows x86 arch:x86
92d47519a5bc56ae422e61ce9eb298ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
GetTickCount
lstrcatA
GetVersionExA
GetLastError
GetCommandLineA
GetFileSize
Sleep
LocalAlloc
LocalFree
GlobalAlloc
lstrlenA
GetStartupInfoA
GlobalFree
FreeLibrary
GetModuleHandleA
msvcrt
_exit
_initterm
toupper
__p__commode
wcslen
_except_handler3
__getmainargs
_controlfp
_XcptFilter
gdi32
LineTo
GetObjectA
ExtTextOutA
CreateCompatibleDC
PatBlt
GetDeviceCaps
CreateFontIndirectA
GetBkColor
user32
DialogBoxParamA
LoadIconA
EndPaint
DestroyWindow
CreateWindowExA
MessageBoxA
DefWindowProcA
TranslateMessage
GetFocus
BeginPaint
GetMessageA
GetSysColor
DispatchMessageA
ShowWindow
ScreenToClient
SetFocus
Sections
.text Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrs Size: 89KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE