Static task
static1
Behavioral task
behavioral1
Sample
42a396046d7e7a3490ab3292a8508a4b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42a396046d7e7a3490ab3292a8508a4b.exe
Resource
win10v2004-20231215-en
General
-
Target
42a396046d7e7a3490ab3292a8508a4b
-
Size
304KB
-
MD5
42a396046d7e7a3490ab3292a8508a4b
-
SHA1
334416dd878d8d65226ea135d81edcc3388c909f
-
SHA256
48ad44800b89afec3513183f7f31dcb11036a47cdcdf9cfba008fb9de09c8a6a
-
SHA512
5587277fb3b6cc6601b07e6be0317b11c73a03666ff4b2f249d109009543417044762817281f1343c9e47f0d1038c264152f97c230b33271aa76f48270a67856
-
SSDEEP
6144:P96cguQyZng4EcWquLvrTdyNQIb5KfQWUvAH/zwXX:PbU0WqujdyNQFIW9wX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42a396046d7e7a3490ab3292a8508a4b
Files
-
42a396046d7e7a3490ab3292a8508a4b.exe windows:4 windows x86 arch:x86
63ac8bd9f3d5e8e103a8da64fae4849f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
FindClose
GetComputerNameA
GetFileAttributesW
CloseHandle
ResetEvent
GetTickCount
GlobalFree
IsDebuggerPresent
GetPrivateProfileIntA
FindAtomA
CreateFileMappingA
VirtualAlloc
GetPriorityClass
GetSystemTime
LoadLibraryW
MapViewOfFile
ExitProcess
lstrlenW
GetModuleHandleW
user32
CreateWindowExA
CloseWindow
GetCaretPos
EndDialog
GetMenu
FillRect
CallWindowProcA
DestroyCaret
GetClientRect
GetDlgItem
DispatchMessageA
DrawStateA
GetClassInfoA
ntshrui
GetNetResourceFromLocalPathA
IsPathSharedW
IsFolderPrivateForUser
GetLocalPathFromNetResourceA
IsPathSharedA
dpnet
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ