Static task
static1
Behavioral task
behavioral1
Sample
0e32d99518aab4c20e5a8030918e6107.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e32d99518aab4c20e5a8030918e6107.exe
Resource
win10v2004-20231215-en
General
-
Target
0e32d99518aab4c20e5a8030918e6107
-
Size
89KB
-
MD5
0e32d99518aab4c20e5a8030918e6107
-
SHA1
633cef1c9e25439b3a6d316e0ebce62091f5497d
-
SHA256
3e81febf28663e8a9b82e40088a5da8e48c785ea11289675b2aaba63328c72e5
-
SHA512
d606215b54e925249648a1329a2dce581024ca8b6b8e19bb2c0da165691fb81d31da8766faa89f894e676f3d70583bcea7077659c36855be1f3b2152102b7529
-
SSDEEP
1536:hAVj2DWyJazTCuiwrDtdaRKdT7OSqrnF/E0m:hIJzTCuHvawt7OSu6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e32d99518aab4c20e5a8030918e6107
Files
-
0e32d99518aab4c20e5a8030918e6107.exe windows:4 windows x86 arch:x86
c0d2b125e9f4ebdcf3105f26978384d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindResourceExA
ExitProcess
CreateThread
SetEvent
GetTickCount
GetCalendarInfoA
DeleteCriticalSection
TlsGetValue
GetDiskFreeSpaceA
VirtualProtect
GetModuleHandleA
ReleaseMutex
GetLastError
FindAtomA
FindVolumeClose
CloseHandle
lstrlenA
Sleep
SearchPathA
user32
EndDialog
CloseWindow
GetMessageA
DragDetect
DispatchMessageA
CopyImage
CreateMenu
IsIconic
GetKeyState
DialogBoxParamA
GetUpdateRect
CreateWindowExA
GetScrollBarInfo
EnableWindow
msdmo
DMOGetName
DMOEnum
DMORegister
DMOGetTypes
DMOUnregister
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE