Static task
static1
Behavioral task
behavioral1
Sample
0586d140ead29c536412a236856c1398.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0586d140ead29c536412a236856c1398.exe
Resource
win10v2004-20231215-en
General
-
Target
0586d140ead29c536412a236856c1398
-
Size
175KB
-
MD5
0586d140ead29c536412a236856c1398
-
SHA1
593859e9b6aad4616d0992db7cce5dfa9fe5a9e8
-
SHA256
bd2c37515ec5849460602d9f0bc9362c6ca0942ee0e30463ba3e036afbd8cbb1
-
SHA512
489d4de3e74557aef909546ce952681c80f38e01d11ad0ee03eb234e43f71c5c06bc776da09299fc82932afef4d4970c3cb35a4836b41f32c1acb93a1f136d48
-
SSDEEP
3072:EcVUaHYq//wkbTxE5xsdJUfn/K6Y3eIgvTRlMIKnWWhOzSeyZmxphDfH9LXMedHK:EcxYq//nXxS+J0Q3e1Cci6hDP9Xz9J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0586d140ead29c536412a236856c1398
Files
-
0586d140ead29c536412a236856c1398.exe windows:4 windows x86 arch:x86
f5aee6522e196ab0f2d6b7463106c398
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyA
kernel32
EnterCriticalSection
GlobalFindAtomA
VirtualQuery
GetEnvironmentStrings
CreateFileA
GetFullPathNameA
GetLocaleInfoA
EnumCalendarInfoA
LocalAlloc
VirtualAllocEx
GetCommandLineW
GetLocalTime
VirtualFree
GetACP
lstrlenA
GetProcAddress
MulDiv
LocalFree
GetFileAttributesA
FindFirstFileA
GetDiskFreeSpaceA
SetLastError
CreateThread
CreateEventA
GetModuleHandleA
GetOEMCP
LoadResource
GetModuleHandleW
SetErrorMode
GetLastError
SetHandleCount
ReadFile
MoveFileExA
ExitProcess
VirtualAlloc
MoveFileA
HeapFree
GetStdHandle
LoadLibraryA
ExitThread
SetFilePointer
CloseHandle
DeleteCriticalSection
SetEvent
GetUserDefaultLCID
IsBadHugeReadPtr
lstrlenW
SetThreadLocale
FormatMessageA
DeleteFileA
GetCurrentProcessId
GlobalAlloc
lstrcmpA
ResetEvent
LoadLibraryExA
WideCharToMultiByte
lstrcatA
CompareStringA
SizeofResource
HeapAlloc
InitializeCriticalSection
user32
PostMessageA
LoadCursorA
LoadBitmapA
SendMessageA
LoadIconA
SetActiveWindow
LoadStringA
RemovePropA
PeekMessageA
RegisterWindowMessageA
SendMessageW
OemToCharA
OpenClipboard
RemoveMenu
PtInRect
MapVirtualKeyA
RegisterClassA
LoadKeyboardLayoutA
RedrawWindow
PeekMessageW
RegisterClipboardFormatA
ReleaseCapture
PostQuitMessage
OffsetRect
MessageBeep
MessageBoxA
ReleaseDC
ScreenToClient
MapWindowPoints
ScrollWindow
shell32
SHGetDesktopFolder
ole32
CreateStreamOnHGlobal
PropVariantClear
CoGetObjectContext
ReleaseStgMedium
CoReleaseMarshalData
comctl32
ImageList_Destroy
ImageList_DragShowNolock
ImageList_DrawEx
ImageList_Add
Sections
CODE Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 2KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 1024B - Virtual size: 862B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ