Static task
static1
Behavioral task
behavioral1
Sample
015642b2a3ed52b5e3bfe4319d16986b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
015642b2a3ed52b5e3bfe4319d16986b.exe
Resource
win10v2004-20231215-en
General
-
Target
015642b2a3ed52b5e3bfe4319d16986b
-
Size
33KB
-
MD5
015642b2a3ed52b5e3bfe4319d16986b
-
SHA1
a3de6318b3b75511bfe226307f1c5de168069afb
-
SHA256
7efe9747d607c6a743830e8fdef63841402f9c8f474a76099b271dc82d4ec5f5
-
SHA512
18cb9f402446da937fe5d039e746e18be27d7e3771824256eea81febde94b2aac12f5ace2b60bbcddf08c74d61ac362c9418b4abe8da5725910ef21fcf4847f9
-
SSDEEP
768:RPM9gabKN6uOXCupgAJ9/9IzFZNIyMFbgIhQ7SM8rD:CbKN6u8CupgAJ9yBZN3MCsQ7R8/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 015642b2a3ed52b5e3bfe4319d16986b
Files
-
015642b2a3ed52b5e3bfe4319d16986b.exe windows:4 windows x86 arch:x86
1bd11cf44474daa4193cbf2b290adfdb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetCurrentDirectoryA
GetLocalTime
CreateFileA
GetModuleHandleA
GetTickCount
GetTickCount
SetLastError
WaitForSingleObject
GetFileAttributesW
WaitForMultipleObjects
CreateMutexW
GetStartupInfoW
GetProfileIntA
GetEnvironmentVariableA
RemoveDirectoryW
CloseHandle
DeleteFileA
ReleaseMutex
HeapCreate
FindClose
GetStdHandle
Sleep
GetFileSize
HeapSize
user32
GetWindowLongA
GetCursorPos
GetDC
GetDC
CallWindowProcW
DispatchMessageW
MessageBoxA
GetDC
GetSysColor
GetClassInfoA
DispatchMessageW
GetDC
PeekMessageA
ctl3d32
Ctl3dCtlColor
Ctl3dCtlColor
Ctl3dCtlColor
Ctl3dCtlColor
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ