Static task
static1
Behavioral task
behavioral1
Sample
1083ce78a70e35b6f95d43f264faa11d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1083ce78a70e35b6f95d43f264faa11d.exe
Resource
win10v2004-20231215-en
General
-
Target
1083ce78a70e35b6f95d43f264faa11d
-
Size
436KB
-
MD5
1083ce78a70e35b6f95d43f264faa11d
-
SHA1
d8c8f03baf16f8142c46cede5d1a323692578242
-
SHA256
3a512629c45af82527c2b314036cb8df7771d1298756556c69482ce37e84ba24
-
SHA512
ccdade25f44b9b71e9b2f525feab083cb8d484d28a90b430aedbc6c0b7200b25db229e60a13d71280e1655086d48ff8702dbc44f605b31fc00f9dd969449999e
-
SSDEEP
12288:E6qzy6IB8ggNOxWOgB7KuScINvYOqN1NOL3R:EvyN8gQvOgll3ivq1Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1083ce78a70e35b6f95d43f264faa11d
Files
-
1083ce78a70e35b6f95d43f264faa11d.exe windows:4 windows x86 arch:x86
2cdfeaec2da14cd31c54c24690187886
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
GetTickCount
LocalFree
LocalAlloc
lstrlenW
InterlockedDecrement
GetCurrentProcess
lstrcmpA
SetEvent
lstrcpyA
InterlockedIncrement
GetModuleHandleA
UnhandledExceptionFilter
VirtualProtect
SetUnhandledExceptionFilter
GetCommandLineA
lstrlenA
GetStartupInfoA
user32
PeekMessageA
CreateWindowExA
PostMessageA
MsgWaitForMultipleObjects
advapi32
RegQueryValueExA
DeregisterEventSource
RegisterEventSourceW
ReportEventW
msvcrt
_controlfp
memset
malloc
free
_except_handler3
wcslen
memmove
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 304KB - Virtual size: 605KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ