Static task
static1
Behavioral task
behavioral1
Sample
166731624bdc03667b140967c33c1fba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
166731624bdc03667b140967c33c1fba.exe
Resource
win10v2004-20231215-en
General
-
Target
166731624bdc03667b140967c33c1fba
-
Size
33KB
-
MD5
166731624bdc03667b140967c33c1fba
-
SHA1
1557340ed93e56d2fd6a38f3c67061edd76e351e
-
SHA256
f0171631bdccd55ac87bec4ac37a6393263f51b4b4f35aebeb815adfd294bef4
-
SHA512
a0fbe56b08f8eec1fdfdc0dd4e8965268a719ed0abb03d1cecf4a6ae8de5d49b15ab2e02ff6ad8b1969884dc0d241adb32156726f948ddebe5a6270ca44fc932
-
SSDEEP
384:PHrHIAo7rOMBM2WCJQwRuM/nBf2ukX147GO07J7+TC/z3ommeKbDpygPG4:zHLoXXGFKBJS9f7J7kbdDpZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 166731624bdc03667b140967c33c1fba
Files
-
166731624bdc03667b140967c33c1fba.exe windows:4 windows x86 arch:x86
0c5c1ae61918789891aa1505a5c8de2c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetCommandLineA
GetModuleFileNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
HeapAlloc
HeapFree
WriteFile
ReadFile
CloseHandle
SetFilePointer
CreateFileA
GetFileType
GetStartupInfoA
GetStdHandle
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetCurrentProcess
ReadProcessMemory
SetUnhandledExceptionFilter
ExitProcess
user32
DispatchMessageA
GetMessageA
LoadIconA
MessageBoxA
TranslateMessage
MessageBoxA
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE