Static task
static1
Behavioral task
behavioral1
Sample
048f634a056fbdc5df560c83f0a115d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
048f634a056fbdc5df560c83f0a115d7.exe
Resource
win10v2004-20231222-en
General
-
Target
048f634a056fbdc5df560c83f0a115d7
-
Size
103KB
-
MD5
048f634a056fbdc5df560c83f0a115d7
-
SHA1
575e4c1acb8ec456d132fab6e0526b64746e05fb
-
SHA256
75e4e51363f7b4378d582315d974f38ade971aa288f11a0ce96150421145c1bc
-
SHA512
3541bc8547d72872acbd5265c4fd7f4148163d8919e09342d1063d1ccf8c42d7223a8025c2a3b8e2282d7dd5c04bc24e0fdedd316b5c6a3714683cf6c830a0c2
-
SSDEEP
3072:a9BgmUvEy2aeAjG1wobmJtlsYr0SLunxJSct:a4mUvb2d4gjS7W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 048f634a056fbdc5df560c83f0a115d7
Files
-
048f634a056fbdc5df560c83f0a115d7.exe windows:4 windows x86 arch:x86
96d76d813d1130be8e565c979b8ac08d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDCOrgEx
CreateFontIndirectA
kernel32
ExitProcess
GetDateFormatA
SizeofResource
GetModuleHandleA
HeapFree
ExitThread
lstrcmpA
lstrcmpiA
FreeLibrary
LoadLibraryA
GetProcAddress
SetLastError
VirtualAlloc
SetHandleCount
RaiseException
GetStdHandle
WideCharToMultiByte
LocalReAlloc
GetCommandLineA
user32
SetRect
GetClassNameA
GetMenuStringA
GetScrollInfo
IsWindowEnabled
FindWindowA
GetSysColor
OffsetRect
IsWindow
RegisterClipboardFormatA
GetScrollPos
GetDlgItem
CallWindowProcA
CharToOemA
GetMenuState
SetMenu
CharUpperBuffA
DrawTextA
CloseClipboard
DefFrameProcA
GetMenuItemCount
GetWindowPlacement
Sections
CODE Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ