Static task
static1
Behavioral task
behavioral1
Sample
0f9c3d40f40971d07780f0df5a09ef05.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f9c3d40f40971d07780f0df5a09ef05.exe
Resource
win10v2004-20231215-en
General
-
Target
0f9c3d40f40971d07780f0df5a09ef05
-
Size
89KB
-
MD5
0f9c3d40f40971d07780f0df5a09ef05
-
SHA1
5f70051f46cb9779a10f48668a65d5790cb9ae5b
-
SHA256
3eb335c513104ae52dc763af100a5511c4499ea18be974198a9a311804165b16
-
SHA512
c31162de2adb8137e50e79e6b503a3bab2bc46b58bd55fbd69edcb105ed268875649a7effdcff14ff20db4ef45cdcf1266f827e94dfca5f2247fd0fddf52f90c
-
SSDEEP
768:PLn2mXHRwnlkKPJU/V4Uk1AW4sfILv0rHyIJ/vP59+CwbCVMB4WkbTY:TNmpP+/ZKzfrHNPT+CwbCFT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f9c3d40f40971d07780f0df5a09ef05
Files
-
0f9c3d40f40971d07780f0df5a09ef05.exe windows:4 windows x86 arch:x86
76485263cf4d481094c652c5fda661ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
CloseHandle
SetEvent
ReleaseMutex
GetModuleHandleA
GetLastError
CreateThread
FindClose
SearchPathA
lstrlenA
VirtualProtect
FindVolumeClose
DeleteCriticalSection
FindResourceExA
ExitProcess
TlsGetValue
GetCalendarInfoA
Sleep
GetDiskFreeSpaceA
FindAtomA
user32
GetScrollBarInfo
EndDialog
CopyImage
DispatchMessageA
GetUpdateRect
EnableWindow
CreateWindowExA
DialogBoxParamA
CreateMenu
IsIconic
GetMessageA
GetKeyState
CloseWindow
DragDetect
msdmo
DMOGetName
DMORegister
DMOUnregister
DMOGetTypes
DMOEnum
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE