Static task
static1
Behavioral task
behavioral1
Sample
14eb2e1f5d4043efb85ba15e4ef1155b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14eb2e1f5d4043efb85ba15e4ef1155b.exe
Resource
win10v2004-20231215-en
General
-
Target
14eb2e1f5d4043efb85ba15e4ef1155b
-
Size
233KB
-
MD5
14eb2e1f5d4043efb85ba15e4ef1155b
-
SHA1
193cbc1de487df4967253580aa000f881c04de66
-
SHA256
50eeac785f906976f8e65d1e61e9ad66c35c866741efc0c8f5943556c407216b
-
SHA512
22aa3050c511e455f914dd8b9c725ce891ab22c3337700ddd347611cd8578a6a5c6a8851cf3ef930064509b10c88ebe3d2c7879d50f926056a79fb93f94b14d7
-
SSDEEP
6144:POsIgB2ASQSFOqE0Wqaemzj+99nEmy3Kf6rTwk:PCgB9SULgv6j+fnE0fs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14eb2e1f5d4043efb85ba15e4ef1155b
Files
-
14eb2e1f5d4043efb85ba15e4ef1155b.exe windows:4 windows x86 arch:x86
0e6d6fc6375377197a2a401b6bbe37ca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strncpy
_CIacos
_CIsinh
_CIlog
memcpy
strlen
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
GetModuleFileNameA
GetCurrentThreadId
GetCurrentProcessId
HeapAlloc
HeapFree
HeapReAlloc
user32
CallWindowProcA
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
GetWindowLongA
SetWindowPos
EnableWindow
EnumWindows
comctl32
InitCommonControlsEx
ole32
CoInitialize
Sections
.code Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 208KB - Virtual size: 212KB