Static task
static1
Behavioral task
behavioral1
Sample
1c09fb17854fb5c33c72e684ca5788c5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1c09fb17854fb5c33c72e684ca5788c5.exe
Resource
win10v2004-20231215-en
General
-
Target
1c09fb17854fb5c33c72e684ca5788c5
-
Size
55KB
-
MD5
1c09fb17854fb5c33c72e684ca5788c5
-
SHA1
ee5871f0f411125f77c96ca53e2b155181c9a441
-
SHA256
fc90be36f0aacb7df2e876577591e1c4c044cfb5b8a870a256d46fe15a91ba99
-
SHA512
6ff08415acbd3768fb8aeab6560af02a3f9e2e609b72523d303052f4eebf102b02e49616c3c4ceeae179b73a7b65ee6c51ba81037897d8a743db287aa93aa191
-
SSDEEP
1536:YANt46K9TJxMlCF1fUe/b3xMYbNRAqjLhJMoFoaBA0pJPCg:Ykt46K9TJgCF1fUmb3xMINRAqpioF7aG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c09fb17854fb5c33c72e684ca5788c5
Files
-
1c09fb17854fb5c33c72e684ca5788c5.exe windows:4 windows x86 arch:x86
2c4988257f0c8bc208db49c34d8a9102
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDebuggerPresent
GetConsoleCP
LocalLock
GetConsoleAliasA
FindClose
CreateFileMappingA
WaitForSingleObject
GetCalendarInfoA
LocalFree
GetLastError
FreeEnvironmentStringsA
LoadLibraryExA
CreateFileA
CloseHandle
TlsGetValue
GetModuleHandleA
HeapCreate
GetACP
LocalUnlock
FindAtomA
user32
DispatchMessageA
CallWindowProcA
GetDC
CascadeWindows
DrawTextA
DrawEdge
DefWindowProcA
GetDlgItem
IsWindow
SetFocus
GetMessageA
CreateDialogParamA
GetIconInfo
DrawIconEx
msasn1
ASN1BERDecNull
ASN1BEREncLength
ASN1BERDecCheck
ASN1BEREncFlush
ASN1BERDecEoid
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ