Static task
static1
Behavioral task
behavioral1
Sample
f6abd3fa9d04f85fcd7535a6138e2b83.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f6abd3fa9d04f85fcd7535a6138e2b83.exe
Resource
win10v2004-20231215-en
General
-
Target
f6abd3fa9d04f85fcd7535a6138e2b83
-
Size
100KB
-
MD5
f6abd3fa9d04f85fcd7535a6138e2b83
-
SHA1
02e872513c7ab94cce22c20e44ae41ac56330166
-
SHA256
46c1a61a3dd70d8f739ee83234f55787b09bdfd126c076dea99b6b95a586dc3c
-
SHA512
271102d24c02e9fcc8706f266c94f83cd5aed31b16b9da9ff64ccd3388dd8550c20361b85b5d86b41585eb207e1c0a3bb6865631aae1c36d8495866d7f2972ac
-
SSDEEP
1536:Aq4ZwtCVwvNKH2h8qUWFudX9UvHZSyO2+Yr/GXLpj:ApCtg7WhHUWgowSkpj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6abd3fa9d04f85fcd7535a6138e2b83
Files
-
f6abd3fa9d04f85fcd7535a6138e2b83.exe windows:4 windows x86 arch:x86
e3489ee24c838a56322122717fcc308a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomW
GetFileAttributesW
ReleaseMutex
GetDiskFreeSpaceW
GetTickCount
CreateThread
ResetEvent
GetCommandLineW
HeapCreate
SetLastError
GetModuleHandleA
lstrcmpiW
GetSystemTime
LocalFree
SetEvent
GetComputerNameA
CreateFileA
LoadLibraryW
ResumeThread
CloseHandle
user32
DestroyCaret
GetClipCursor
SetFocus
DrawStateA
GetClassInfoA
GetKeyState
FillRect
CallWindowProcA
DispatchMessageA
GetComboBoxInfo
CreateWindowExA
CloseWindow
GetDlgItem
MessageBoxA
cryptdlg
CertTrustCertPolicy
DecodeRecipientID
CertTrustInit
CertTrustFinalPolicy
CertConfigureTrustA
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE