Static task
static1
Behavioral task
behavioral1
Sample
1035de9671ceb8cc9aa9d763c99e72a2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1035de9671ceb8cc9aa9d763c99e72a2.exe
Resource
win10v2004-20231215-en
General
-
Target
1035de9671ceb8cc9aa9d763c99e72a2
-
Size
253KB
-
MD5
1035de9671ceb8cc9aa9d763c99e72a2
-
SHA1
76381899d49296b0f4b370f5c10fdcd38b38e3d4
-
SHA256
c647dcb46831e65d476d442ac9f9f039bde562e76142f2447495b430c84c70f7
-
SHA512
9e7b31cf5c9d0d7bb0d11755eb959f512b67fa5b66573e0b467cc822bd130efb8809715ad7ee08409b540cf2093fc436e332b6c1ceebe3862334e919fcd2c7d4
-
SSDEEP
6144:qxWbQwvOxxHrscgUZX7c0ElrIbASTRnxSr:7bQ9xHrDgUZXGWf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1035de9671ceb8cc9aa9d763c99e72a2
Files
-
1035de9671ceb8cc9aa9d763c99e72a2.exe windows:4 windows x86 arch:x86
92868fe30a061addbc97fd766547e266
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeFormatA
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
CreateThread
Sleep
GetStartupInfoA
user32
DefWindowProcA
RegisterClassA
LoadCursorA
PostQuitMessage
DestroyWindow
SetDlgItemTextA
CreateWindowExA
LoadIconA
GetWindowRect
MessageBoxA
FindWindowA
LoadImageA
ReleaseDC
GetDCEx
WaitMessage
DispatchMessageA
TranslateMessage
PeekMessageA
ShowWindow
SetFocus
GetSystemMetrics
UpdateWindow
gdi32
CreateRectRgnIndirect
DeleteObject
CreateCompatibleBitmap
GetStockObject
GetObjectA
msvcp60
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
msvcrt
sprintf
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
atoi
memmove
malloc
getenv
??2@YAPAXI@Z
memset
memcpy
_except_handler3
rand
strlen
_controlfp
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ