Static task
static1
Behavioral task
behavioral1
Sample
114e0d4cff546b7c2b4444806f3520f7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
114e0d4cff546b7c2b4444806f3520f7.exe
Resource
win10v2004-20231215-en
General
-
Target
114e0d4cff546b7c2b4444806f3520f7
-
Size
89KB
-
MD5
114e0d4cff546b7c2b4444806f3520f7
-
SHA1
1d7779195041bbffe60f0174ec250707f68fa55f
-
SHA256
506e81443fcde7621621a2965f5324459854349964e2d171bf3b5b8bba12a97e
-
SHA512
bab96fe28589e636e27ec86d9d97af1c5ca232e640bc5f9a5c551f0dcc6aeb6b182f8448b58d3f110b6ea250cce1f9e75f8c3e83098869c4bd779e2296049f72
-
SSDEEP
768:n4SiYLn2G2hqCniGU1JTcyZI9BZIVKRvw21nnnnRYZxe6qaKHzRUZziPcr1+ebgY:n4fGgfL4UBZiKRY+Yfrq918ciLg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 114e0d4cff546b7c2b4444806f3520f7
Files
-
114e0d4cff546b7c2b4444806f3520f7.exe windows:4 windows x86 arch:x86
28f410223faaff7f94192f8df0976fbd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetDiskFreeSpaceA
FindResourceExA
FindAtomA
SetEvent
CloseHandle
ReleaseMutex
FindVolumeClose
GetCalendarInfoA
ExitProcess
SearchPathA
GetLastError
lstrlenA
DeleteCriticalSection
VirtualProtect
GetTickCount
TlsGetValue
CreateThread
GetModuleHandleA
Sleep
user32
IsIconic
EnableWindow
DragDetect
GetKeyState
GetUpdateRect
CreateMenu
CopyImage
EndDialog
GetScrollBarInfo
DispatchMessageA
CloseWindow
GetMessageA
CreateWindowExA
DialogBoxParamA
msdmo
DMOEnum
DMOGetTypes
DMOUnregister
DMOGetName
DMORegister
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE