Static task
static1
Behavioral task
behavioral1
Sample
603caf4d9ad237c19c15ef71ff06c9a1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
603caf4d9ad237c19c15ef71ff06c9a1.exe
Resource
win10v2004-20231215-en
General
-
Target
603caf4d9ad237c19c15ef71ff06c9a1
-
Size
261KB
-
MD5
603caf4d9ad237c19c15ef71ff06c9a1
-
SHA1
6bd3dc47d87062805bb6004ee6c50c4ecc2bee3a
-
SHA256
a2148e04936aad2f1d98452f50ca6bad4d55dfc136b139ec096bc291c59c6e01
-
SHA512
733e28aa64719b27e3b5a856923071a5e63dcd485bc7e163da052edb35e4c479577b169abb3ef0bc2efff60c4fd99a070f44a09028bbebe33e34266108d85e76
-
SSDEEP
3072:+/gDnogUx22LAtxr3BrrVe73BJRMFtBKd5Q8arKCmxgwD5LnWHXa:+/0nuPMv1Ix4FHKd/+KVDVnZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 603caf4d9ad237c19c15ef71ff06c9a1
Files
-
603caf4d9ad237c19c15ef71ff06c9a1.exe windows:4 windows x86 arch:x86
d9cac96521647679aa094079b5726773
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControls
user32
GetInputState
GetDesktopWindow
GetMessagePos
CharNextA
kernel32
SetCurrentDirectoryA
GetProcessHeap
GetVersion
GetModuleHandleA
lstrcmpiA
GetCommandLineW
GlobalFindAtomA
DeleteFileA
lstrlenW
GetOEMCP
GetACP
lstrcmpA
GetCurrentThreadId
VirtualAlloc
CopyFileA
GetCurrentProcessId
IsDebuggerPresent
GetUserDefaultLangID
lstrcmpiW
GlobalFindAtomW
GetCurrentThread
GetCurrentProcess
gdi32
MoveToEx
GetStockObject
SetBkColor
EndDoc
SetColorSpace
GetDeviceCaps
RestoreDC
SetBrushOrgEx
OffsetViewportOrgEx
GetDIBColorTable
GetPixel
SetTextColor
UnrealizeObject
GetDCOrgEx
LineTo
GetPaletteEntries
SetViewportOrgEx
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ