Static task
static1
Behavioral task
behavioral1
Sample
25344d4fa7cb65b94e86a4d10a51f20b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
25344d4fa7cb65b94e86a4d10a51f20b.exe
Resource
win10v2004-20231215-en
General
-
Target
25344d4fa7cb65b94e86a4d10a51f20b
-
Size
370KB
-
MD5
25344d4fa7cb65b94e86a4d10a51f20b
-
SHA1
f340b06bc9b81634206214b8b80a71893fac64a0
-
SHA256
18adf7ac82aa314822cf47099df92893a86b44f66671cb3a370bcfd583c57322
-
SHA512
fd10eb29aad3f16385e93b3966386f96cda2fcb7340233c15bfb11aa60e3d91eb5a23f44f83ddbe12bed2ef0de92dcb702ceaa37775505a2808d93c38471f80f
-
SSDEEP
6144:gCrZxvARMtt0HEAT1fxhcMxW2pL7lv6w2K/PkFtR6sFHYnHFWhTyHVEOSQTQiJYs:/GRMIHEAJLjpFv6w2K/PkFtlVMHFWg10
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25344d4fa7cb65b94e86a4d10a51f20b
Files
-
25344d4fa7cb65b94e86a4d10a51f20b.exe windows:4 windows x86 arch:x86
6efd2fcee1b8e4bda3309a943be8947e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
WriteFile
lstrlenW
GetEnvironmentVariableW
GetCurrentThreadId
IsBadStringPtrW
GetCurrentProcessId
FindAtomA
LocalFree
FindClose
InitializeCriticalSection
HeapCreate
LoadLibraryW
TlsGetValue
GetFileTime
GetDriveTypeA
ReleaseMutex
CreateEventW
GlobalFlags
GetPrivateProfileStringA
user32
GetClientRect
GetKeyboardType
EndDialog
DrawStateW
DrawTextA
GetSysColor
SetFocus
DispatchMessageA
IsWindow
GetClassInfoA
CallWindowProcW
CreateWindowExA
GetSysColor
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
cryptui
LocalEnroll
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ