Static task
static1
Behavioral task
behavioral1
Sample
05e68a1eda8d5d10343c69b7612684ed.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05e68a1eda8d5d10343c69b7612684ed.exe
Resource
win10v2004-20231215-en
General
-
Target
05e68a1eda8d5d10343c69b7612684ed
-
Size
393KB
-
MD5
05e68a1eda8d5d10343c69b7612684ed
-
SHA1
177bdcc78b3a7a054bbc4f4d78585251776058fd
-
SHA256
c598f85f49491812e3e02ec24ac1f6661379ec2b51b9a639eccdb4027dd3c6e9
-
SHA512
09e02b1c2b57d6e4dcb43506ca58419e186bd0ed3ec5581f4e6d1b58b5587830c69a8632a97e6828e1c4213a785c388c8269476a2b57fceafd33526f24a34e15
-
SSDEEP
6144:rtH6S1dGppg6gUmXepiZujTthY8fMccz907DP3dMKsucbTb9Vhpfn2OGsi:/dGppg0zj7Y8Sz96jdbsucLJaX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05e68a1eda8d5d10343c69b7612684ed
Files
-
05e68a1eda8d5d10343c69b7612684ed.exe windows:4 windows x86 arch:x86
0c00977c63e70bb1bc0bc8a750ea922e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDebuggerPresent
TlsGetValue
GetACP
GetFullPathNameA
GetLastError
FreeEnvironmentStringsA
HeapCreate
IsBadReadPtr
CreateFileMappingA
CreateFileA
FindClose
GlobalLock
GetConsoleCP
LoadLibraryExA
GetStdHandle
LocalFree
CloseHandle
LocalUnlock
GetModuleHandleA
CreateEventA
user32
IsWindow
SetFocus
EndDialog
GetDC
DispatchMessageA
GetDlgItem
CreateDialogParamA
ScrollWindow
GetIconInfo
GetMessageA
DefWindowProcA
PostMessageA
EmptyClipboard
DrawIconEx
msasn1
ASN1BERDecEoid
ASN1BEREncLength
ASN1BERDecCheck
ASN1BERDecBool
ASN1BEREncFlush
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ