Static task
static1
Behavioral task
behavioral1
Sample
59fe8295ce03f427752aad1a6c56b506.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59fe8295ce03f427752aad1a6c56b506.exe
Resource
win10v2004-20231215-en
General
-
Target
59fe8295ce03f427752aad1a6c56b506
-
Size
125KB
-
MD5
59fe8295ce03f427752aad1a6c56b506
-
SHA1
35ca12da50dc83b82af0e6dd4a906ea5f606abfe
-
SHA256
56d356240a18cd0f35249cc796878bc2c877083bc559a0130cd7e8a7304d7d8e
-
SHA512
801838a81487496767f7c9ef8bc07805a98c9f52cff58785e3398f48067bebbed2fa240b8e87fdd0c901c722f8a15d04c2de14b9c095efe03c2ed6833e7e151c
-
SSDEEP
3072:s6bcUXAojcNYhsyZGxQx0N+8fHMON6u0wMOzGy5:hbcTW4R+GxQx8UON6GMOKy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59fe8295ce03f427752aad1a6c56b506
Files
-
59fe8295ce03f427752aad1a6c56b506.exe windows:4 windows x86 arch:x86
7c0bf46a8136d256cf4e37cc973c6ee3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
ReleaseMutex
HeapCreate
GetStdHandle
FindResourceA
DeleteAtom
SetEnvironmentVariableA
SetLastError
GetPriorityClass
GetCurrentThreadId
GlobalFree
GetModuleHandleA
LoadLibraryExW
CreateMutexA
VirtualQuery
CloseHandle
CreateFileA
lstrlenW
TlsGetValue
GetExitCodeProcess
user32
FillRect
CallWindowProcA
CheckRadioButton
SetFocus
DrawEdge
DrawMenuBar
IsWindow
CreateMenu
GetIconInfo
GetDC
CreateWindowExA
GetDlgItem
DispatchMessageA
ntshrui
IsPathSharedA
GetLocalPathFromNetResourceA
IsPathSharedW
SetFolderPermissionsForSharing
GetNetResourceFromLocalPathA
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 92KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE