Static task
static1
Behavioral task
behavioral1
Sample
0172145dbab78fb047d3cf5bf86fe0d1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0172145dbab78fb047d3cf5bf86fe0d1.exe
Resource
win10v2004-20231222-en
General
-
Target
0172145dbab78fb047d3cf5bf86fe0d1
-
Size
11KB
-
MD5
0172145dbab78fb047d3cf5bf86fe0d1
-
SHA1
45c2d992c91fe46d1fc0d95360697926adfcc8a1
-
SHA256
dbaf43414c1878bfe3de2beaab6580eb958e4cca7327a0b5204043d68bc49b3e
-
SHA512
8580cfbdb28716b89b6709f5c6b2ee7a6e6bf63ac549914f332c6d14f54de872e7e8fc10e0b8927ae1a2dadbd6ef74d87b6389f31e120546d9601ddf546d5803
-
SSDEEP
192:4fCdyGuJAcA51rQFmcKa4FiR1JMGL3tlBfcXZy4VF:SC0Gsy510k/NFKnVjLWpy2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0172145dbab78fb047d3cf5bf86fe0d1
Files
-
0172145dbab78fb047d3cf5bf86fe0d1.exe windows:4 windows x86 arch:x86
d5adacd25bd2257a9e09972917d8745d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
CloseHandle
TerminateThread
LocalAlloc
LocalFree
GetModuleHandleA
Sleep
ExitProcess
MultiByteToWideChar
GetCommandLineA
GetExitCodeThread
GetSystemTime
advapi32
RegCreateKeyA
RegQueryValueExA
RegCloseKey
RegSetValueExA
gdi32
GetStockObject
ole32
OleInitialize
CoCreateInstance
OleUninitialize
oleaut32
SysFreeString
SysAllocString
user32
GetMessageA
CreateWindowExA
TranslateMessage
DispatchMessageA
LoadCursorA
RegisterClassExA
DefWindowProcA
PostQuitMessage
GetClientRect
MessageBoxA
DestroyWindow
LoadIconA
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 812B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rebld_i Size: 906B - Virtual size: 906B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE