Static task
static1
Behavioral task
behavioral1
Sample
fe28b29a17ff2b1a9e67223f46fa22aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fe28b29a17ff2b1a9e67223f46fa22aa.exe
Resource
win10v2004-20231215-en
General
-
Target
fe28b29a17ff2b1a9e67223f46fa22aa
-
Size
65KB
-
MD5
fe28b29a17ff2b1a9e67223f46fa22aa
-
SHA1
c28251b35df1f1484813c15e7ebfa429030d8622
-
SHA256
870a73acde82829b4816d13518b9415fdb39c14f64557cf5755473b8757ba34c
-
SHA512
8400de0768d6c0baed985a7134b4d3306782fd652ddeb4208dfd7127cf0b98675521f922ee61e07359ac935db4f143e744159e7cbc99613c1b92558f1777e3c3
-
SSDEEP
768:XtEoZh/TswD8sU5vLMu7PAiRKZ20u1tgffoE6rHmOaU8agaP6DyanzOG:XtEoX9D8sMMOPAoKu/aforfazagfyaH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe28b29a17ff2b1a9e67223f46fa22aa
Files
-
fe28b29a17ff2b1a9e67223f46fa22aa.exe windows:4 windows x86 arch:x86
f3d24f7988d5c5ad6a1021144823874a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
FindResourceW
SetLastError
GlobalUnlock
HeapCreate
LoadLibraryExW
UnmapViewOfFile
GetCurrentThreadId
FindClose
CloseHandle
lstrlenA
GetCurrentDirectoryA
CreateFileW
PulseEvent
Sleep
GetCommandLineA
GetComputerNameA
LocalFree
CreateProcessA
GetModuleHandleA
user32
FillRect
SetFocus
CallWindowProcA
DrawMenuBar
DrawEdge
GetCaretPos
CheckRadioButton
GetDlgItem
GetDC
IsWindow
DispatchMessageA
CreateIcon
CreateWindowExA
rsaenh
CPGenKey
CPHashData
CPDecrypt
CPDeriveKey
CPSignHash
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE