Static task
static1
Behavioral task
behavioral1
Sample
0176f08a83852d54bc840b52a8480b74.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0176f08a83852d54bc840b52a8480b74.exe
Resource
win10v2004-20231215-en
General
-
Target
0176f08a83852d54bc840b52a8480b74
-
Size
43KB
-
MD5
0176f08a83852d54bc840b52a8480b74
-
SHA1
d3a4565f149c0445b2907a1ad653e6ef03843e5d
-
SHA256
c9f7abc2b0f10a9cf0633d253b87095afc6cc738aaacc561c32bb3889c318d28
-
SHA512
fe0fbe3e39d42f2055d169bb205a767bac2f4b57de3bcc79381e837db9820af0351583fde57c0c9fb8b1ba6ec025ab9ba562bd496bcc33c082340c2e789f607e
-
SSDEEP
768:bkykWA7n+dmzVIyU1t/VLxez49bDVXNxFQyUFr23Og9pKtgnMsXRVCWJaZhse8H:bkyC+d6DKVNez49b/xFYl23OYnfDC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0176f08a83852d54bc840b52a8480b74
Files
-
0176f08a83852d54bc840b52a8480b74.exe windows:5 windows x86 arch:x86
fc65b645058c8efa3138f0552fbe56f4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetCommandLineA
FlushFileBuffers
OpenProcess
lstrcmpiA
lstrlenA
GetDriveTypeW
SetEndOfFile
CreateMutexW
DisconnectNamedPipe
MoveFileExW
FindFirstFileW
SetFileAttributesW
ExpandEnvironmentStringsW
MultiByteToWideChar
CreateThread
SetLastError
EnterCriticalSection
CreateProcessW
GetModuleHandleA
CopyFileW
GetModuleFileNameA
UnmapViewOfFile
GetTimeZoneInformation
FindClose
GetSystemTime
SetThreadPriority
SetEvent
SetFileTime
lstrcpynW
GlobalLock
user32
GetMessageA
GetWindowTextW
DrawIcon
Sections
.pwv Size: 35KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zcdyf Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dshyt Size: 4KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ