Static task
static1
Behavioral task
behavioral1
Sample
1ec71770e44a6ac7682f329e3586fec9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ec71770e44a6ac7682f329e3586fec9.exe
Resource
win10v2004-20231215-en
General
-
Target
1ec71770e44a6ac7682f329e3586fec9
-
Size
45KB
-
MD5
1ec71770e44a6ac7682f329e3586fec9
-
SHA1
c3168f93867e888560b2cbd44cb88a4ee2dc34ea
-
SHA256
51a121b789be5ec4e9e632f78fa2ef87b97d618c161200c9f4a0947942f856e8
-
SHA512
478266233b0e36a9e76f7a626957260f6493d57e12601f3cc53802f78705b9a2c0ed10cc37d03f1326cd8b96727f8063e47f535c3866794a0f4f0fd92db20195
-
SSDEEP
768:my+ppmjf3hXDMzfww9VypRvyLVqpcK4N0Stmy/X/YnafQr6iY2:TspmjfNqpaypscK4QmE+V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1ec71770e44a6ac7682f329e3586fec9
Files
-
1ec71770e44a6ac7682f329e3586fec9.exe windows:4 windows x86 arch:x86
62623e14345a8453a2a8bfc52428baf2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
HeapCreate
GetModuleHandleA
lstrlenW
LoadLibraryExA
TlsAlloc
CreateMutexA
GetEnvironmentVariableA
GetStdHandle
DeleteAtom
ReleaseMutex
CloseHandle
GlobalUnlock
GetProcessHeap
FindResourceA
GetCurrentThreadId
CreateFileA
GetExitCodeProcess
TlsGetValue
GlobalFree
user32
GetDC
GetDlgItem
DrawMenuBar
CallWindowProcA
FillRect
DrawEdge
SetFocus
IsWindow
CreateWindowExA
CreateMenu
CheckRadioButton
DispatchMessageA
GetCaretPos
rsaenh
CPGenKey
CPHashData
CPDeriveKey
CPDecrypt
CPSignHash
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE