Static task
static1
Behavioral task
behavioral1
Sample
080545d0d123ac5bb10889ad542c079a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
080545d0d123ac5bb10889ad542c079a.exe
Resource
win10v2004-20231215-en
General
-
Target
080545d0d123ac5bb10889ad542c079a
-
Size
392KB
-
MD5
080545d0d123ac5bb10889ad542c079a
-
SHA1
335619de8ff91d4d97209cfe0df1869bbc51b349
-
SHA256
3da0db7dbfadb4b9db05ce73fcf26a2d33b8ebf3560f857e6fabff1ca88167ab
-
SHA512
8c273a0f3c587cf2554a31d9f3c47f9d70aafbed2b1a6b2962fd8018cb83fd5c9b8b496b1c85456ac0a6dcc0a061320340b1d43e5cfebcd4e36cd0cb9dbf1eff
-
SSDEEP
6144:zcy70g2/ycos8Fk4NfVJ6fH92qsB9eoVnY80fej8TWVmWr:ztgd/Is8Fkk9J6f8r1Yfej8Twv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 080545d0d123ac5bb10889ad542c079a
Files
-
080545d0d123ac5bb10889ad542c079a.exe windows:4 windows x86 arch:x86
f6c9fbb40e2d932260b02bd35571d7e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetTickCount
GetSystemTime
lstrlenA
CloseHandle
SetEvent
GetCommandLineW
LocalFree
Sleep
GetComputerNameA
LoadLibraryExW
FindVolumeClose
CreateThread
GetModuleHandleA
GetTimeFormatA
SetLastError
UnmapViewOfFile
LocalUnlock
GetCurrentDirectoryA
CreateFileA
user32
CallWindowProcA
IsWindow
DrawEdge
GetComboBoxInfo
DispatchMessageA
CreateWindowExA
FillRect
SetFocus
GetDlgItem
DrawMenuBar
GetDC
CheckRadioButton
GetKeyState
cryptui
CryptUIDlgSelectCA
LocalEnroll
WizardFree
CryptUIDlgSelectStoreA
CryptUIDlgCertMgr
inetcpl.cpl
OpenFontsDialog
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 732KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ