Static task
static1
Behavioral task
behavioral1
Sample
056d10946ae4d48d6088e7043267dfda.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
056d10946ae4d48d6088e7043267dfda.exe
Resource
win10v2004-20231215-en
General
-
Target
056d10946ae4d48d6088e7043267dfda
-
Size
49KB
-
MD5
056d10946ae4d48d6088e7043267dfda
-
SHA1
ec863e9fc4b8f0f5e0dad43a239ca8c345ebc9e5
-
SHA256
b68db8b09fc64980340e04eccc05b23d9b5fee867a82d14428363ff3b2fe3f22
-
SHA512
c0b7d4dcfc2f6028cb21c9f87a8824e9ef9678f25bd4aeb764790a89fced4ba53758f5aa121992530e62f0666c8ee40eaf473d9b7f1e378c0c3057dd97fdfd68
-
SSDEEP
768:FARo7Alq+FSGiteq5JqRCeWYqsc0mY105f0f1B6Tu+WYK6gf+VOB3UC2cXasfM:TAl6+PRCvYxc0x108b6fnG+23EcX2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 056d10946ae4d48d6088e7043267dfda
Files
-
056d10946ae4d48d6088e7043267dfda.exe windows:5 windows x86 arch:x86
8e7ae2c0bd21872c22abdf01ef910044
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
OpenDesktopA
GetDlgItemTextA
SetThreadDesktop
ExitWindowsEx
EndDialog
GetKeyboardState
GetWindowThreadProcessId
CloseWindowStation
GetKeyState
OpenWindowStationA
DrawIcon
PeekMessageW
GetDlgItem
GetWindowTextW
CloseDesktop
CharLowerBuffA
ToUnicode
GetClipboardData
GetIconInfo
GetWindowLongW
DispatchMessageW
MsgWaitForMultipleObjects
SetProcessWindowStation
GetDlgItemTextW
GetForegroundWindow
PeekMessageA
GetMessageA
GetMessageW
FindWindowExW
LoadCursorW
SendMessageW
GetClassNameW
GetCursorPos
kernel32
MoveFileExW
IsBadReadPtr
GetCurrentThreadId
ResetEvent
CloseHandle
GetLogicalDrives
GetTimeZoneInformation
GetLocalTime
ExpandEnvironmentStringsW
WaitForSingleObject
HeapAlloc
GetModuleFileNameA
HeapFree
GlobalLock
WriteProcessMemory
GetFileSizeEx
MultiByteToWideChar
CreateThread
GetSystemTime
GetModuleFileNameW
CreateDirectoryW
CreateProcessW
SystemTimeToFileTime
GetTempPathW
LeaveCriticalSection
GetProcessHeap
FindResourceW
GetVersionExW
lstrcpyW
OpenMutexW
CreateMutexW
SetThreadPriority
HeapReAlloc
UnmapViewOfFile
GetCurrentProcessId
lstrcpyA
OpenProcess
FindClose
FlushFileBuffers
GetExitCodeProcess
GetSystemTimeAsFileTime
ReadFile
GetFileSize
CopyFileW
DisconnectNamedPipe
ReleaseMutex
GetThreadPriority
InitializeCriticalSection
CreateFileW
SetEvent
FindNextFileW
lstrlenA
GetDriveTypeW
GetTickCount
lstrcpynW
FindFirstFileW
Sleep
Sections
.pix Size: 38KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pex Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lip Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ