Static task
static1
Behavioral task
behavioral1
Sample
04ecfdb83f23ace470dc775eda1e15b4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04ecfdb83f23ace470dc775eda1e15b4.exe
Resource
win10v2004-20231215-en
General
-
Target
04ecfdb83f23ace470dc775eda1e15b4
-
Size
152KB
-
MD5
04ecfdb83f23ace470dc775eda1e15b4
-
SHA1
89ea620e4e175c7678de939c8b7ca5211f3b198c
-
SHA256
e830ec1241c816f5a5c98750c0c71b4a8a6864078d3ce9589ffe6f75eabec4c7
-
SHA512
d3adad7c1bb9d92338b5627d1a2cbc498c2b7b707315948789cd36ab00bbab76630e7a847d41043b3ba23baab88262bf25196eade1db55d1ba0f33113a141068
-
SSDEEP
3072:rMI7OQEkExkehqqN7qoSC9ieK7HoNFLMum:rryaehqqhECwp7cDm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04ecfdb83f23ace470dc775eda1e15b4
Files
-
04ecfdb83f23ace470dc775eda1e15b4.exe windows:4 windows x86 arch:x86
bdc4aa0598b19fa8d6ecf9b219208d93
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
FindClose
SetFileAttributesA
FindNextFileA
FindFirstFileA
OpenProcess
GetCurrentProcess
DeleteFileA
GetTempPathA
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
FindResourceA
SizeofResource
LoadResource
LockResource
FreeResource
CopyFileA
CreateDirectoryA
GetModuleFileNameA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
SetEndOfFile
ReadFile
RtlUnwind
GetLastError
GetFileAttributesA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapFree
HeapAlloc
GetCommandLineA
GetVersion
ExitProcess
RaiseException
WideCharToMultiByte
LCMapStringA
LCMapStringW
HeapReAlloc
HeapSize
CloseHandle
WriteFile
SetFilePointer
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetUnhandledExceptionFilter
FlushFileBuffers
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CreateFileA
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEnvironmentVariableA
advapi32
RegDeleteKeyA
RegRestoreKeyA
RegOpenKeyA
RegSaveKeyA
RegCloseKey
RegCreateKeyA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
shell32
SHGetSpecialFolderPathA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ