Static task
static1
Behavioral task
behavioral1
Sample
0f72c22136311a29af80e8da698a0f4a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f72c22136311a29af80e8da698a0f4a.exe
Resource
win10v2004-20231222-en
General
-
Target
0f72c22136311a29af80e8da698a0f4a
-
Size
89KB
-
MD5
0f72c22136311a29af80e8da698a0f4a
-
SHA1
2c75ce87b8e51e5a55fb8f8c5dc4d89fac14e526
-
SHA256
3ef56b05415ec83934cc131d854ec4b32274aba43333c818d7f1053706cca3db
-
SHA512
407c93bf34fea9282d0e1ab67842b32493191ba2589e3df7de1345df7f0e7d0e9bcb1ce59cb2c02868a03e7b1bf59ba34c10ec65e8dcfc2640703b0b92b16aeb
-
SSDEEP
1536:y5tjKMwtCVwvNKH2hr84spPsqdbDRzF8JS1/YYv:yfCtg7WhrhspP/dD9F8I/YYv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f72c22136311a29af80e8da698a0f4a
Files
-
0f72c22136311a29af80e8da698a0f4a.exe windows:4 windows x86 arch:x86
cf7d53b14b42dec04ebd9d89ba4a685d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
LoadLibraryW
lstrcmpiW
ResumeThread
LocalFree
GetSystemTime
GetCommandLineW
SetEvent
ResetEvent
GetModuleHandleA
FindAtomW
HeapCreate
GetDiskFreeSpaceW
GetComputerNameA
ReleaseMutex
GetFileAttributesW
CreateFileA
SetLastError
CreateThread
GetTickCount
user32
DispatchMessageA
GetDlgItem
GetClassInfoA
GetKeyState
DestroyCaret
CloseWindow
GetClipCursor
CallWindowProcA
FillRect
SetFocus
GetComboBoxInfo
DrawStateA
CreateWindowExA
MessageBoxA
cryptdlg
CertTrustFinalPolicy
DecodeRecipientID
CertConfigureTrustA
CertTrustInit
CertTrustCertPolicy
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE