Static task
static1
Behavioral task
behavioral1
Sample
0b3133f81951637f9ad9d2f0f927c3ef.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b3133f81951637f9ad9d2f0f927c3ef.exe
Resource
win10v2004-20231215-en
General
-
Target
0b3133f81951637f9ad9d2f0f927c3ef
-
Size
46KB
-
MD5
0b3133f81951637f9ad9d2f0f927c3ef
-
SHA1
42ac6f0d410d68f3f143562189bda832f5da8f84
-
SHA256
e7b58f9d294846cd16a389ee454ce2c23e0f551220b05fb3d02bd20c80b0b951
-
SHA512
7e6a396f274df00b9563a392a0633bb3ed879c7d8e17dff7563c6fe4153f48e8eb7ad5b2244c209aa6c7621a5760cca91a640d7e23056388e178f66fc0c596ca
-
SSDEEP
384:Kq2DocNMQ4k5vDZ1Ze8z63w9ATmhW6rXTaEiOOy1CTsTjpMXw74YRy:KzNdvDv6A9UB7O11CQhHls
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b3133f81951637f9ad9d2f0f927c3ef
Files
-
0b3133f81951637f9ad9d2f0f927c3ef.exe windows:4 windows x86 arch:x86
3fc6e110e1c99f22754ca494a7f46924
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetTempPathA
GetTickCount
GetSystemInfo
GetVersionExA
CloseHandle
MoveFileA
CreateFileA
GetModuleFileNameA
GetCurrentDirectoryA
FreeLibrary
FreeResource
SizeofResource
LoadResource
GetCurrentThreadId
GetStartupInfoA
GetModuleHandleA
Sleep
WriteFile
ExitProcess
user32
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
GetInputState
PostThreadMessageA
GetMessageA
wsprintfA
FindWindowA
PostMessageA
OpenWindowStationA
shell32
ShellExecuteA
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_strrev
_adjust_fdiv
_controlfp
__setusermatherr
_initterm
strcpy
memset
sprintf
strlen
??3@YAXPAX@Z
memcpy
??2@YAPAXI@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE